Skip to main content

AWS DVA-C02 Drill: Secure Secrets Management - Parameter Store vs. Secrets Manager

Jeff Taakey
Author
Jeff Taakey
21+ Year Enterprise Architect | AWS SAA/SAP & Multi-Cloud Expert.

Jeff’s Note
#

Unlike generic exam dumps, ADH analyzes this scenario through the lens of a Real-World Lead Developer.

For AWS DVA-C02 candidates, the confusion often lies in how to securely inject sensitive configuration (like API keys) into containerized applications without leaking credentials. In production, this is about knowing exactly which AWS service manages secrets with proper rotation, encryption, and least privilege access. Let’s drill down.

The Certification Drill (Simulated Question)
#

Scenario
#

Acme Innovations is building a microservices-based application deployed within Amazon Elastic Kubernetes Service (EKS) containers. The app needs to communicate securely with an external payment gateway and must authenticate API requests using API keys. The lead developer must design a secure approach to store and provide these API keys to the application running inside containers. Exposing these keys in source code or container images is prohibited due to security policies.

The Requirement:
#

Identify two viable and secure solutions to store and supply the API keys to the containerized application, ensuring that secrets are protected and retrieved at runtime.

The Options
#

  • A) Store the API keys as a SecureString parameter in AWS Systems Manager Parameter Store. Grant the application IAM permission to retrieve the parameter during container startup.

  • B) Embed the API keys in the AWS CloudFormation template using base64 encoding. Pass the API keys to containers via environment variables defined in the container specification.

  • C) Add a CloudFormation parameter for the API keys and pass them as environment variables to containers during deployment.

  • D) Hardcode the API keys inside the application code, build the container image on the developer workstation, then push the image to Amazon Elastic Container Registry (ECR).

  • E) Store the API keys as a SecretString in AWS Secrets Manager and grant the application IAM permission to read the secret at runtime.


Google adsense
#

leave a comment:

Correct Answer
#

A and E

Quick Insight: The Developer’s Imperative
#

Secure secrets management means avoiding static embedding of sensitive keys in code or container images.
Parameter Store (SecureString) and Secrets Manager (SecretString) are designed for secure retrieval and encryption at rest with fine-grained IAM controls.
Passing secrets via environment variables from static CloudFormation templates or embedding keys into images risks leaks and violates best practices.

Content Locked: The Expert Analysis
#

You’ve identified the answer. But do you know the implementation details that separate a Junior from a Senior?


The Expert’s Analysis
#

Correct Answer
#

Options A and E

The Winning Logic
#

  • Option A: AWS Systems Manager Parameter Store supports storing SecureString parameters that are encrypted with KMS. You can assign precise IAM permissions to allow your application to fetch the parameter securely at runtime without exposing the secret in the image or code. This option is often favored for less frequent or simpler secret management needs.

  • Option E: AWS Secrets Manager stores secrets (like API keys) as SecretString with automatic rotation (if configured), seamless encryption at rest using KMS, and fine-grained IAM policies. Secrets Manager is purpose-built for managing credentials securely, including the ability to rotate keys transparently.

Both A and E ensure that secrets remain encrypted at rest and are never stored plainly in the container image or source code. Access is granted based on IAM roles assigned to the application pods or containers.

The Trap (Distractor Analysis)
#

  • Why not B? Embedding API keys within CloudFormation templates, even if base64 encoded, offers no real encryption or protection since base64 is just encoding. Environment variables passed this way become static and can be leaked easily.

  • Why not C? Passing sensitive data as CloudFormation parameters into container environment variables exposes the secrets in deployment artifacts or CloudFormation templates, which is a security risk and violates principle of least privilege.

  • Why not D? Hardcoding secrets in application code and baking them into container images risks permanent exposure of secrets. Once included in images pushed to ECR, secrets’ exposure surface increases drastically.


The Technical Blueprint
#

# Example CLI command to create a SecureString parameter in Parameter Store
aws ssm put-parameter --name "/acme/payment/api-key" --value "AKIA....XYZ" --type SecureString --key-id alias/aws/ssm
# Example CLI command to retrieve secret from Secrets Manager
aws secretsmanager get-secret-value --secret-id AcmePaymentAPIKey

The Comparative Analysis
#

Option API Complexity Performance Use Case
A Moderate (SSM SDK calls) Good Simple secret storage without rotation
E Moderate (SecretsManager SDK) Good Robust secret management with rotation
B Low Good Insecure — only encoding, no encryption
C Low Good Insecure — secrets exposed in templates
D None N/A Insecure — exposes secrets in container image

Real-World Application (Practitioner Insight)
#

Exam Rule
#

“For the exam, always pick AWS Secrets Manager when you see ‘API key’ or ‘credentials’ requiring secure storage with potential rotation. Parameter Store SecureString is acceptable for simpler scenarios.”

Real World
#

“In production, teams often use Secrets Manager with automated rotation for credentials linked to external services. Parameter Store is sometimes leveraged when fewer features are sufficient or to reduce costs.”


(CTA) Stop Guessing, Start Mastering
#


Disclaimer

This is a study note based on simulated scenarios for the AWS DVA-C02 exam.

The DevPro Network: Mission and Founder

A 21-Year Tech Leadership Journey

Jeff Taakey has driven complex systems for over two decades, serving in pivotal roles as an Architect, Technical Director, and startup Co-founder/CTO.

He holds both an MBA degree and a Computer Science Master's degree from an English-speaking university in Hong Kong. His expertise is further backed by multiple international certifications including TOGAF, PMP, ITIL, and AWS SAA.

His experience spans diverse sectors and includes leading large, multidisciplinary teams (up to 86 people). He has also served as a Development Team Lead while cooperating with global teams spanning North America, Europe, and Asia-Pacific. He has spearheaded the design of an industry cloud platform. This work was often conducted within global Fortune 500 environments like IBM, Citi and Panasonic.

Following a recent Master’s degree from an English-speaking university in Hong Kong, he launched this platform to share advanced, practical technical knowledge with the global developer community.


About This Site: AWS.CertDevPro.com


AWS.CertDevPro.com focuses exclusively on mastering the Amazon Web Services ecosystem. We transform raw practice questions into strategic Decision Matrices. Led by Jeff Taakey (MBA & 21-year veteran of IBM/Citi), we provide the exclusive SAA and SAP Master Packs designed to move your cloud expertise from certification-ready to project-ready.