@@ -174,14 +174,14 @@ deploy:
174174
175175## Security Best Practices
176176
177- ### Never Do This
177+ ### Anti-Patterns to Avoid
178178
179- ❌ Store AWS credentials in your repository
180- ❌ Put AWS credentials in ` .env` files tracked by git
181- ❌ Use long-lived AWS access keys in production
182- ❌ Share AWS credentials between environments
179+ ❌ Storing AWS credentials in your repository
180+ ❌ Putting AWS credentials in ` .env` files tracked by git
181+ ❌ Using long-lived AWS access keys in production
182+ ❌ Sharing AWS credentials between environments
183183
184- # ## Always Do This
184+ # ## Recommended Practices
185185
186186✅ Use temporary credentials when possible (aws-vault, SSO, instance roles)
187187✅ Apply least-privilege IAM policies
@@ -211,32 +211,6 @@ After setting up authentication, you need to configure IAM permissions for the A
211211
212212Each vault type requires specific IAM permissions based on your usage pattern (read-only, read-write, or admin access).
213213
214- # # PHP Application Considerations
215-
216- When using Keep with PHP applications :
217-
218- 1. **Don't hardcode AWS credentials in config**
219- ` ` ` php
220- // config/aws.php - DON'T DO THIS
221- 'credentials' => [
222- 'key' => env('AWS_ACCESS_KEY_ID'),
223- 'secret' => env('AWS_SECRET_ACCESS_KEY'),
224- ]
225- ` ` `
226-
227- 2. **Let the SDK find credentials automatically**
228- ` ` ` php
229- // config/aws.php - DO THIS
230- 'credentials' => null, // SDK will use IAM role, ~/.aws/credentials, etc.
231- ` ` `
232-
233- 3. **Generate .env before caching configuration**
234- ` ` ` bash
235- # deployment.sh
236- keep export --stage=production --output=.env
237- # Then cache your application configuration if needed
238- ` ` `
239-
240214# # Troubleshooting
241215
242216**"Keep can't find AWS credentials"**
0 commit comments