Skip to main content

Sensitive Data

Sensitive data includes passwords, API keys, tokens, and other confidential information that requires protection from unauthorized access or exposure. Mission Control provides comprehensive protection for sensitive data throughout the entire playbook lifecycle.

Secret Parameters

Use secret type parameters to handle sensitive data in playbooks:

parameters:
- name: database_password
type: secret
label: "Database Password"
description: "Password for database connection"
required: true

KMS Connection

info

Your Mission Control instance must have a KMS connection configured to use secret parameters.

Configure this using the --secret-keeper-connection flag:

mission-control serve --secret-keeper-connection "connection://default/my-kms-key"

or in the helm chart:

kmsConnection: "connection://default/my-kms-key"

Supported connection types:

  • AWS KMS
  • Azure Key Vault
  • GCP KMS