Configure envelope encryption with KEK/DEK hierarchy to protect deployment credentials and user-defined secrets.
GoRules BRMS uses envelope encryption with a KEK/DEK (Key Encryption Key / Data Encryption Key) hierarchy to protect sensitive data such as deployment credentials and user-defined secrets.
The KEK (master key) must never be deleted or changed. If the KEK is lost or changed, all DEKs become unrecoverable and all encrypted secrets are permanently lost.
Best practices:
Restrict access: Only automated systems should have access to the KEK. Human access should be emergency-only.
Never delete: Configure key deletion protection in your KMS provider.
Backup carefully: If using environment variable provider, ensure the master key is securely backed up.
Audit access: Enable KMS audit logging to track all key operations.
KMS Provider
Recommended Settings
AWS KMS
Enable key deletion protection, restrict IAM to kms:Encrypt and kms:Decrypt only
Azure Key Vault
Enable purge protection, use RBAC with minimal permissions