Store API keys, passwords, certificates, and other sensitive data in cloud-native secret management services and access them from K8s clusters. — Introduction Secrets are essential for the operation of many production systems. Unintended secrets exposure is one of the top risks that should be properly addressed. Developers should do their best to protect application secrets. The problem becomes even harder, once a company moves to a microservice architecture and multiple services require…