{"id":6603,"date":"2026-02-18T11:55:44","date_gmt":"2026-02-18T10:55:44","guid":{"rendered":"https:\/\/understandingdata.eu\/?p=6603"},"modified":"2026-03-25T12:38:45","modified_gmt":"2026-03-25T11:38:45","slug":"secrets","status":"publish","type":"post","link":"https:\/\/understandingdata.eu\/nl\/blog\/secrets\/","title":{"rendered":"Geheimen"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6603\" class=\"elementor elementor-6603\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-98b20a1 e-con-full e-flex e-con e-parent\" data-id=\"98b20a1\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-391b2655 e-flex e-con-boxed e-con e-child\" data-id=\"391b2655\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-142130df e-con-full e-flex e-con e-child\" data-id=\"142130df\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69ed657d elementor-widget elementor-widget-heading\" data-id=\"69ed657d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secrets<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd94db2 elementor-author-box--name-yes elementor-author-box--link-no elementor-widget elementor-widget-author-box\" data-id=\"bd94db2\" data-element_type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tFloris Remmen\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e215c54 elementor-widget elementor-widget-text-editor\" data-id=\"4e215c54\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What is a secret? Some things you want to tell everyone, such as: We are the partner for data-driven work. Other things you prefer not to tell everyone, such as the PIN code of your bank card.<\/p><div id=\"ConnectiveDocSignExtentionInstalled\" data-extension-version=\"1.0.4\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e9efe76 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2e9efe76\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"350\" src=\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png\" class=\"attachment-full size-full wp-image-6628\" alt=\"\" srcset=\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png 700w, https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets-300x150.png 300w, https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets-18x9.png 18w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c4ee367 e-flex e-con-boxed e-con e-child\" data-id=\"6c4ee367\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7ee83b98 e-con-full e-flex e-con e-child\" data-id=\"7ee83b98\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-763efb7 elementor-widget elementor-widget-text-editor\" data-id=\"763efb7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In computer systems, \u201csecrets\u201d are confidential pieces of information. For example: &#8211; The access password for your database &#8211; The username of your SaaS system Secrets belong to your software, but you usually want to store them in a different place. You would not leave the key of your safe hanging on the safe itself. An interesting idea is that you can cut the key of your safe into 100 pieces and still keep those pieces next to the safe. This way, the key is nearby, but you need to know how to put the pieces together before you can use it. <br \/>In practice, we use two systems for this: HashiCorp Vault or OpenBao () (a digital safe), and SOPS (). This blog post continues with SOPS. SOPS, also known as &#8220;Secret OPerationS&#8221;, is a project from Mozilla. SOPS encrypts sensitive data using one or more keys. This makes the data unreadable for both humans and machines. Do you want to work together with multiple people who need access to the same sensitive data? SOPS allows you to include multiple decryption keys inside the files.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f198574 elementor-widget elementor-widget-heading\" data-id=\"f198574\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to use it<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51304c5 elementor-widget elementor-widget-text-editor\" data-id=\"51304c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>1.Put your decryption key in a configuration file. For example, you can add the public part of your SSH key there.\u200b<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a23a605 elementor-widget elementor-widget-code-highlight\" data-id=\"a23a605\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-default  \">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-markup line-numbers\">\n\t\t\t\t<code readonly=\"true\" class=\"language-markup\">\n\t\t\t\t\t<xmp># .sops.yaml\n# Create a decryption key, for example an SSH key, and store it in a .sops.yaml file.\ncreation_rules:\n  - path_regex: \\.(env|yml|yaml|pem)$\n    age: >-\n        ssh-ed25519 ........ # Public key of user 1 with permission to decrypt.\n        ssh-ed25519 ........ # Public key of the machine where you want to deploy it.\n        ...<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7357b93 elementor-widget elementor-widget-text-editor\" data-id=\"7357b93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2.Encrypt your file<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bcf1cf elementor-widget elementor-widget-code-highlight\" data-id=\"8bcf1cf\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-default  \">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-markup line-numbers\">\n\t\t\t\t<code readonly=\"true\" class=\"language-markup\">\n\t\t\t\t\t<xmp>sops edit my_secrets.yaml\n\nhello: Welcome to SOPS! Edit this file as you please!\nexample_key: example_value\n# Example comment\nexample_array:\n    - example_value1\n    - example_value2\nexample_number: 1234.56789\nexample_booleans:\n    - true\n    - false<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fa87c9 elementor-widget elementor-widget-text-editor\" data-id=\"2fa87c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>3.Your file is automatically saved with encryption. You can still read the keys, for example example_array, but you cannot read the data.<code spellcheck=\"false\"><\/code><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1cc546 elementor-widget elementor-widget-code-highlight\" data-id=\"a1cc546\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-default  \">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-markup line-numbers\">\n\t\t\t\t<code readonly=\"true\" class=\"language-markup\">\n\t\t\t\t\t<xmp>hello: ENC[AES256_GCM,data:FfadDI+dd1zsMJR9po\/rv4Z3g18tY6hubPd\/7vMmlW3IqBohP+xpY6MMa6qfDA==,iv:U1ufW9jgiKJrSG80bd4SuImWpbpgsPJf6biww\/FFMkM=,tag:LOTPo27w\/omFXyyTS2O7MQ==,type:str]\nexample_key: ENC[AES256_GCM,data:9GN+nyiGmBMF2aOnoyQEgtD\/,iv:mjG49EK3XaJ\/kha4cYTM5NoOHdcClI3LP\/JVOpOx1cs=,tag:4rPHJoJXgGW5UY1MYznMMA==,type:str]\n#ENC[AES256_GCM,data:pAqrTMufIvKHq2NdZoM9mw==,iv:6JJjV5+di0kXR4bm1SVmi7R3NfRZZ8\/F5YX5kBz8phk=,tag:p9To2T06PiRMv7zmxfL\/ug==,type:comment]\nexample_array:\n    - ENC[AES256_GCM,data:mdg5RoR2XctOHcT+CzI=,iv:V9ONFXETKkmaTNtJbJY2Sy8ha3YFe286zEur\/m0wn9c=,tag:KEqBACJpZXLJVhCxlgeD6w==,type:str]\n    - ENC[AES256_GCM,data:3nacSOHMrASRJXiP+qA=,iv:JRae\/zGftxsme10+BOUsYTnk4cvVikq0\/D8RvQ\/GQn4=,tag:kaUEj2cecJ2P7232sVuvGg==,type:str]\nexample_number: ENC[AES256_GCM,data:KKfW9ubiYpuSaw==,iv:At7NtpbD5xzxBKyhmQ4EnBXgE19XAAvZDB3lynAw7to=,tag:3a8KcPRUjlakc3VE3+\/69Q==,type:float]\nexample_booleans:\n    - ENC[AES256_GCM,data:iOl2Pw==,iv:aDhWCvWs1EAq8txHLSvhmLzbNyIFgPB6rrCh92tAg9I=,tag:YmlzXdi5Cr8Drap7IHhgzQ==,type:bool]\n    - ENC[AES256_GCM,data:xbIdH+o=,iv:QpFg+luwyrjzbdkQiTLkKEIihNXxHWUNjbv3xLp+zbo=,tag:79eHsgeyQhBHY7DmAN45bg==,type:bool]\nsops:\n    age:\n        - recipient: ssh-ed25519 ...\n          enc: |\n            -----BEGIN AGE ENCRYPTED FILE-----\n            ...\n            -----END AGE ENCRYPTED FILE-----\n    lastmodified: \"2026-02-16T14:58:05Z\"\n    mac: ENC[AES256_GCM,data:kyWm9uKt7foMzWEM3dq23124GFGTOx011bT5ysqXAW+1X+buJwg0kKDexs3pP3u3T0wsCFYxLAuUwCvGH4BK2xeNKN32ruOHpHuQUourUPao\/IC9EZ5v8ctb7w9b1ZuX6gJUNBqHasdsdqRRTQ039fwsMFjepjqMBG8s9LR+w4RPlmG634=,iv:8tSCM6l8BvStSRzalCl\/Gm5L3c2DoF0LXtYJN\/neETE=,tag:+fZhW0SXFvvZ\/aWRw04oTA==,type:str]\n    unencrypted_suffix: _unencrypted\n    version: 3.11.0<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b9e01f elementor-widget elementor-widget-text-editor\" data-id=\"4b9e01f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>4.You can safely share this file. It is completely useless without the key.<\/p><p>5.Another user with the correct key can easily decrypt the file using <code class=\"inline\" style=\"font-size: 16px;\" spellcheck=\"false\">\/co<\/code>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4a5591 elementor-widget elementor-widget-code-highlight\" data-id=\"c4a5591\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-default  \">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-markup line-numbers\">\n\t\t\t\t<code readonly=\"true\" class=\"language-markup\">\n\t\t\t\t\t<xmp>sops decrypt my_secrets.yaml<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfe91a8 elementor-widget elementor-widget-text-editor\" data-id=\"dfe91a8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>6.Do you not have the correct permissions? Then SOPS will let you know.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b03e0 elementor-widget elementor-widget-code-highlight\" data-id=\"26b03e0\" data-element_type=\"widget\" data-widget_type=\"code-highlight.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"prismjs-default  \">\n\t\t\t<pre data-line=\"\" class=\"highlight-height language-markup line-numbers\">\n\t\t\t\t<code readonly=\"true\" class=\"language-markup\">\n\t\t\t\t\t<xmp>sops decrypt my_secrets.yaml   \n\nFailed to get the data key required to decrypt the SOPS file.\n\nGroup 0: FAILED\n  \n  ssh-ed25519 ... : FAILED\n    - | failed to create reader for decrypting sops data key with\n      | age: no identity matched any of the recipients. Did not find\n      | keys in locations 'SOPS_AGE_SSH_PRIVATE_KEY_FILE',\n      | '\/home\/floris\/.ssh\/id_rsa', 'SOPS_AGE_KEY',\n      | 'SOPS_AGE_KEY_FILE', and 'SOPS_AGE_KEY_CMD'.\n\nRecovery failed because no master key was able to decrypt the file. In\norder for SOPS to recover the file, at least one key has to be successful,\nbut none were.<\/xmp>\n\t\t\t\t<\/code>\n\t\t\t<\/pre>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9845504 elementor-widget elementor-widget-text-editor\" data-id=\"9845504\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-pm-slice=\"1 1 [&quot;ordered_list&quot;,{&quot;order&quot;:1,&quot;listStyle&quot;:&quot;&quot;},&quot;list_item&quot;,{}]\">\u00a0<\/p><p dir=\"auto\" data-pm-slice=\"1 1 [&quot;ordered_list&quot;,{&quot;order&quot;:1,&quot;listStyle&quot;:&quot;&quot;},&quot;list_item&quot;,{}]\">Would you like to learn more about encryption at rest, encryption in transit, or data security and encryption in general? <a href=\"https:\/\/understandingdata.eu\/contact-data-experts\/\">Contact us now.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73d54c88 e-flex e-con-boxed e-con e-parent\" data-id=\"73d54c88\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cdca50a elementor-widget elementor-widget-spacer\" data-id=\"3cdca50a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc60091 elementor-widget elementor-widget-heading\" data-id=\"3dc60091\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to Design Your Data Future?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13154e1a elementor-widget elementor-widget-spacer\" data-id=\"13154e1a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-423fdf60 elementor-widget elementor-widget-heading\" data-id=\"423fdf60\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let's Create Your Strategic Roadmap<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d1a8d3c elementor-widget elementor-widget-spacer\" data-id=\"5d1a8d3c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a11d243 elementor-widget elementor-widget-text-editor\" data-id=\"6a11d243\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Do you want to make better use of your data and information? Contact us now, and learn how we can bring your organisation to the next level.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54a3e352 elementor-widget elementor-widget-spacer\" data-id=\"54a3e352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-380f151a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"380f151a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/understandingdata.eu\/contact-data-experts\/business-project-inquiries\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50aea2b6 elementor-widget elementor-widget-spacer\" data-id=\"50aea2b6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-415bdeb e-flex e-con-boxed e-con e-parent\" data-id=\"415bdeb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is a secret? Some things you want to tell everyone, such as: We are the partner for data-driven work. Other things you prefer not to tell everyone, such as the PIN code of your bank card. \u00a0 In computer systems, \u201csecrets\u201d are confidential pieces of information. For example: &#8211; The access password for your [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6628,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[17],"tags":[39,38,37],"class_list":["post-6603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-encryption","tag-secrets","tag-sops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secrets - Understanding Data<\/title>\n<meta name=\"description\" content=\"Discover how SOPS helps you encrypt and manage secrets. Securely store, share, and control access to sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/understandingdata.eu\/nl\/blog\/secrets\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets - Understanding Data\" \/>\n<meta property=\"og:description\" content=\"Discover how SOPS helps you encrypt and manage secrets. Securely store, share, and control access to sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/understandingdata.eu\/nl\/blog\/secrets\/\" \/>\n<meta property=\"og:site_name\" content=\"Understanding Data\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T10:55:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T11:38:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Floris Remmen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Floris Remmen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/\"},\"author\":{\"name\":\"Floris Remmen\",\"@id\":\"https:\/\/understandingdata.eu\/#\/schema\/person\/c10b590727c7c9c772be7e5b242ab3a9\"},\"headline\":\"Secrets\",\"datePublished\":\"2026-02-18T10:55:44+00:00\",\"dateModified\":\"2026-03-25T11:38:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/\"},\"wordCount\":373,\"publisher\":{\"@id\":\"https:\/\/understandingdata.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png\",\"keywords\":[\"Encryption\",\"secrets\",\"SOPS\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"nl-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/\",\"url\":\"https:\/\/understandingdata.eu\/blog\/secrets\/\",\"name\":\"Secrets - Understanding Data\",\"isPartOf\":{\"@id\":\"https:\/\/understandingdata.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png\",\"datePublished\":\"2026-02-18T10:55:44+00:00\",\"dateModified\":\"2026-03-25T11:38:45+00:00\",\"description\":\"Discover how SOPS helps you encrypt and manage secrets. Securely store, share, and control access to sensitive data.\",\"breadcrumb\":{\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#breadcrumb\"},\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/understandingdata.eu\/blog\/secrets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-BE\",\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage\",\"url\":\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png\",\"contentUrl\":\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png\",\"width\":700,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/understandingdata.eu\/blog\/secrets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/understandingdata.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secrets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/understandingdata.eu\/#website\",\"url\":\"https:\/\/understandingdata.eu\/\",\"name\":\"Understanding Data\",\"description\":\"Pioneering data solutions to empower society\",\"publisher\":{\"@id\":\"https:\/\/understandingdata.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/understandingdata.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/understandingdata.eu\/#organization\",\"name\":\"Understanding Data\",\"url\":\"https:\/\/understandingdata.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-BE\",\"@id\":\"https:\/\/understandingdata.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2024\/05\/UDtext-logo-zwart-breed.svg\",\"contentUrl\":\"https:\/\/understandingdata.eu\/wp-content\/uploads\/2024\/05\/UDtext-logo-zwart-breed.svg\",\"width\":673,\"height\":149,\"caption\":\"Understanding Data\"},\"image\":{\"@id\":\"https:\/\/understandingdata.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/floris-remmen\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/understandingdata.eu\/#\/schema\/person\/c10b590727c7c9c772be7e5b242ab3a9\",\"name\":\"Floris Remmen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-BE\",\"@id\":\"https:\/\/understandingdata.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/29c0de85d8671aa7dd7ee3ab1a0c72d71f3c43a7106baae75626643ad02fbd35?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/29c0de85d8671aa7dd7ee3ab1a0c72d71f3c43a7106baae75626643ad02fbd35?s=96&d=mm&r=g\",\"caption\":\"Floris Remmen\"},\"sameAs\":[\"https:\/\/understandingdata.eu\"],\"url\":\"https:\/\/understandingdata.eu\/nl\/author\/floris\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secrets - Understanding Data","description":"Discover how SOPS helps you encrypt and manage secrets. Securely store, share, and control access to sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/understandingdata.eu\/nl\/blog\/secrets\/","og_locale":"nl_BE","og_type":"article","og_title":"Secrets - Understanding Data","og_description":"Discover how SOPS helps you encrypt and manage secrets. Securely store, share, and control access to sensitive data.","og_url":"https:\/\/understandingdata.eu\/nl\/blog\/secrets\/","og_site_name":"Understanding Data","article_published_time":"2026-02-18T10:55:44+00:00","article_modified_time":"2026-03-25T11:38:45+00:00","og_image":[{"width":700,"height":350,"url":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png","type":"image\/png"}],"author":"Floris Remmen","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"Floris Remmen","Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#article","isPartOf":{"@id":"https:\/\/understandingdata.eu\/blog\/secrets\/"},"author":{"name":"Floris Remmen","@id":"https:\/\/understandingdata.eu\/#\/schema\/person\/c10b590727c7c9c772be7e5b242ab3a9"},"headline":"Secrets","datePublished":"2026-02-18T10:55:44+00:00","dateModified":"2026-03-25T11:38:45+00:00","mainEntityOfPage":{"@id":"https:\/\/understandingdata.eu\/blog\/secrets\/"},"wordCount":373,"publisher":{"@id":"https:\/\/understandingdata.eu\/#organization"},"image":{"@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage"},"thumbnailUrl":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png","keywords":["Encryption","secrets","SOPS"],"articleSection":["Blog"],"inLanguage":"nl-BE"},{"@type":"WebPage","@id":"https:\/\/understandingdata.eu\/blog\/secrets\/","url":"https:\/\/understandingdata.eu\/blog\/secrets\/","name":"Secrets - Understanding Data","isPartOf":{"@id":"https:\/\/understandingdata.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage"},"image":{"@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage"},"thumbnailUrl":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png","datePublished":"2026-02-18T10:55:44+00:00","dateModified":"2026-03-25T11:38:45+00:00","description":"Discover how SOPS helps you encrypt and manage secrets. Securely store, share, and control access to sensitive data.","breadcrumb":{"@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#breadcrumb"},"inLanguage":"nl-BE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/understandingdata.eu\/blog\/secrets\/"]}]},{"@type":"ImageObject","inLanguage":"nl-BE","@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#primaryimage","url":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png","contentUrl":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2026\/02\/Secrets.png","width":700,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/understandingdata.eu\/blog\/secrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/understandingdata.eu\/"},{"@type":"ListItem","position":2,"name":"Secrets"}]},{"@type":"WebSite","@id":"https:\/\/understandingdata.eu\/#website","url":"https:\/\/understandingdata.eu\/","name":"Understanding Data","description":"Pioneering data solutions to empower society","publisher":{"@id":"https:\/\/understandingdata.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/understandingdata.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-BE"},{"@type":"Organization","@id":"https:\/\/understandingdata.eu\/#organization","name":"Understanding Data","url":"https:\/\/understandingdata.eu\/","logo":{"@type":"ImageObject","inLanguage":"nl-BE","@id":"https:\/\/understandingdata.eu\/#\/schema\/logo\/image\/","url":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2024\/05\/UDtext-logo-zwart-breed.svg","contentUrl":"https:\/\/understandingdata.eu\/wp-content\/uploads\/2024\/05\/UDtext-logo-zwart-breed.svg","width":673,"height":149,"caption":"Understanding Data"},"image":{"@id":"https:\/\/understandingdata.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/floris-remmen\/"]},{"@type":"Person","@id":"https:\/\/understandingdata.eu\/#\/schema\/person\/c10b590727c7c9c772be7e5b242ab3a9","name":"Floris Remmen","image":{"@type":"ImageObject","inLanguage":"nl-BE","@id":"https:\/\/understandingdata.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/29c0de85d8671aa7dd7ee3ab1a0c72d71f3c43a7106baae75626643ad02fbd35?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29c0de85d8671aa7dd7ee3ab1a0c72d71f3c43a7106baae75626643ad02fbd35?s=96&d=mm&r=g","caption":"Floris Remmen"},"sameAs":["https:\/\/understandingdata.eu"],"url":"https:\/\/understandingdata.eu\/nl\/author\/floris\/"}]}},"_links":{"self":[{"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/posts\/6603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/comments?post=6603"}],"version-history":[{"count":49,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/posts\/6603\/revisions"}],"predecessor-version":[{"id":6889,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/posts\/6603\/revisions\/6889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/media\/6628"}],"wp:attachment":[{"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/media?parent=6603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/categories?post=6603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/understandingdata.eu\/nl\/wp-json\/wp\/v2\/tags?post=6603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}