我們不建議使用 Google Cloud's Secret Manager 儲存及輪替服務帳戶金鑰。這是因為應用程式需要Google Cloud 可辨識的身分,才能存取 Secret Manager 密鑰。如果應用程式已有可辨識的身分,應用程式即可使用該身分進行驗證,而不必使用服務帳戶金鑰。 Google Cloud Google Cloud
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-07-09 (世界標準時間)。"],[[["Service account keys should be rotated regularly, ideally at least every 90 days, to mitigate the risks associated with leaked or stolen keys."],["Rotating service account keys involves creating new keys, replacing existing ones in applications, disabling the old keys, and then deleting the replaced keys after confirmation that the applications are working correctly."],["Centralized secret management services like HashiCorp Vault can be used for automatic key rotation, but cloud-based secret managers are not recommended if the application already has an identity."],["A custom notification system can be implemented to alert teams when service account keys need rotation, leveraging Cloud Asset Inventory to identify keys based on their creation time."],["Expiring service account keys are not advised for key rotation due to the potential for outages if not managed properly; instead, using the rotation process is preferred."]]],[]]