Secret Management Disadvantages

  • Need to handle failover and replication yourself
  • Not compliant with regulatory requirements which specify FIPS-certified hardware
  • Approach is only suitable for Infrastructure as a Service (IaaS), as there is a need to install and configure your own servers to perform key management