Skip to main content
Redhat Developers  Logo
  • AI

    Get started with AI

    • Red Hat AI
      Accelerate the development and deployment of enterprise AI solutions.
    • AI learning hub
      Explore learning materials and tools, organized by task.
    • AI interactive demos
      Click through scenarios with Red Hat AI, including training LLMs and more.
    • AI/ML learning paths
      Expand your OpenShift AI knowledge using these learning resources.
    • AI quickstarts
      Focused AI use cases designed for fast deployment on Red Hat AI platforms.
    • No-cost AI training
      Foundational Red Hat AI training.

    Featured resources

    • OpenShift AI learning
    • Open source AI for developers
    • AI product application development
    • Open source-powered AI/ML for hybrid cloud
    • AI and Node.js cheat sheet

    Red Hat AI Factory with NVIDIA

    • Red Hat AI Factory with NVIDIA is a co-engineered, enterprise-grade AI solution for building, deploying, and managing AI at scale across hybrid cloud environments.
    • Explore the solution
  • Learn

    Self-guided

    • Documentation
      Find answers, get step-by-step guidance, and learn how to use Red Hat products.
    • Learning paths
      Explore curated walkthroughs for common development tasks.
    • See all learning

    Hands-on

    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.
    • Interactive labs
      Learn by doing in these hands-on, browser-based experiences.
    • Interactive demos
      Click through product features in these guided tours.

    Browse by topic

    • AI/ML
    • Automation
    • Java
    • Kubernetes
    • Linux
    • See all topics

    Training & certifications

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Build

    Get started

    • Red Hat build of Podman Desktop
      A downloadable, local development hub to experiment with our products and builds.
    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.

    Download products

    • Access product downloads to start building and testing right away.
    • Red Hat Enterprise Linux
    • Red Hat AI
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat Developer Toolset

    References

    • E-books
    • Documentation
    • Cheat sheets
    • Architecture center
  • Community

    Get involved

    • Events
    • Live AI events
    • Red Hat Summit
    • Red Hat Accelerators
    • Community discussions

    Follow along

    • Articles & blogs
    • Developer newsletter
    • Videos
    • Github

    Get help

    • Customer service
    • Customer support
    • Regional contacts
    • Find a partner

    Join the Red Hat Developer program

    • Download Red Hat products and project builds, access support documentation, learning content, and more.
    • Explore the benefits

Zero trust security and dynamic credentials on OpenShift

Advanced strategies for managing ephemeral credentials and network isolation in CI/CD pipelines

January 5, 2026
Antonio Biondillo
Related topics:
CI/CDDevSecOpsKubernetesSecuritySystem design
Related products:
Red Hat Advanced Cluster Security for KubernetesRed Hat OpenShift Container PlatformRed Hat Trusted Software Supply Chain

    In my previous article, we explored externalizing secrets using the External Secrets Operator (ESO). This follow-up addresses the next step in DevSecOps evolution: eliminating long-term secrets in favor of dynamic, ephemeral credentials and advanced network isolation.

    For architects and site reliability engineers operating on Red Hat OpenShift, the goal is to transform the pipeline from a consumer of static passwords into an entity with a verifiable identity, capable of negotiating "just-in-time" (JIT) access.

    Zero trust architecture for pipelines

    The logical diagram in Figure 1 illustrates the authentication and authorization flow between components.

    Sequence Diagram
    Figure 1: Diagram showing how a building task confirms its identity and requests temporary credentials to connect to a database.

    Workload identity

    There is no longer a static "secret zero." Identity is guaranteed by the OpenShift ServiceAccount token, which is cryptographically signed and verified by HashiCorp Vault via the TokenReview API.

    Network isolation: User-defined networks

    For high-security multi-tenant environments, such as banking or telecommunications, standard NetworkPolicies might not suffice. With OpenShift 4.18 and later, user-defined networks (UDN) allow for complete Layer 2/3 isolation for critical pipeline namespaces.

    Here is an example of how to set up a user-defined network. This manifest isolates pipeline traffic in a dedicated overlay network, preventing lateral movement from other compromised pods in the cluster.

    apiVersion: network.openshift.io/v1
    kind: UserDefinedNetwork
    metadata:
      name: secure-pipeline-net
      namespace: ci-cd-secure
    spec:
      topology: Layer3
      layer3:
        role: Primary
        subnets:
          - cidr: 10.0.128.0/24
            hostSubnet: 24

    Requesting temporary credentials with Vault

    Instead of using a static secret, we use the VaultDynamicSecret custom resource to instruct the External Secrets Operator to request credentials only when they are needed.

    Example: A database migration pipeline requiring DDL privileges only while the task is running.

    apiVersion: generators.external-secrets.io/v1alpha1
    kind: VaultDynamicSecret
    metadata:
      name: dynamic-db-creds
      namespace: ci-cd
    spec:
      # Database engine path configured in Vault
      path: "database/creds/pipeline-migration-role"
      method: "GET"
      provider:
        server: "http://vault.vault.svc:8200"
        auth:
          kubernetes:
            mountPath: "kubernetes"
            role: "pipeline-role"
            serviceAccountRef:
              name: "pipeline-sa"

    Consumption in Tekton: Volume vs. env var

    Important: Never inject dynamic secrets as environment variables (env). If the secret rotates or expires during execution, the process will not see the new value. Always use volumeMounts, as Kubernetes updates files in the volume atomically.

    An optimized Tekton task:

    apiVersion: tekton.dev/v1beta1
    kind: Task
    metadata:
      name: flyway-migration
    spec:
      stepTemplate:
        volumeMounts:
          - name: db-creds
            mountPath: /etc/secrets
            readOnly: true
      steps:
        - name: migrate
          image: flyway/flyway:latest
          script: |
            #!/bin/sh
            # Reads fresh credentials from the filesystem at runtime
            export FLYWAY_USER=$(cat /etc/secrets/username)
            export FLYWAY_PASSWORD=$(cat /etc/secrets/password)
            
            flyway -url=jdbc:postgresql://prod-db:5432/mydb migrate
      volumes:
        - name: db-creds
          secret:
            secretName: db-dynamic-secret # Generated by ESO

    Reverse sync: The PushSecret pattern

    In hybrid scenarios (such as when an on-premise OpenShift updates a service on IBM Cloud or Azure), use PushSecret to propagate certificates or keys generated by the pipeline to an external vault.

    apiVersion: external-secrets.io/v1alpha1
    kind: PushSecret
    metadata:
      name: push-generated-cert
      namespace: ci-cd
    spec:
      refreshInterval: 10s
      deletionPolicy: Delete
      secretStoreRefs:
        - name: ibm-secrets-manager
          kind: ClusterSecretStore
      selector:
        secret:
          name: generated-mtls-cert # Secret created by the pipeline
      data:
        - match:
            secretKey: tls.crt
            remoteRef:
              remoteKey: imported-certs/app-cert

    Security context and compliance

    To ensure compliance with Red Hat Advanced Cluster Security for Kubernetes, every task must operate with minimal privileges.

    • Drop capabilities: Remove all capabilities in the SecurityContext.
    • Seccomp profile: Apply RuntimeDefault.
    • Short time to live (TTL): Configure Vault roles with a maximum TTL equal to the Tekton task timeout (such as 15 minutes).

    Vault role configuration (HCL snippet):

    path "database/creds/pipeline-migration-role" {
      capabilities = ["read"]
      ttl = "15m"
      max_ttl = "1h"
    }

    Conclusion

    Adopting dynamic credentials on OpenShift transforms security from "perimeter defense" to "continuous verification." By combining Tekton, the External Secrets Operator, and the new user-defined networks, you can build pipelines that possess no secrets but rent them only for the milliseconds required for execution, drastically reducing the attack surface of the software supply chain.

    Related Posts

    • Manage credentials with Tekton and OpenShift on IBM Cloud

    • Introducing the external secrets operator for OpenShift

    • Zero trust automation on AWS with Ansible and Terraform

    • Integrate Red Hat build of Trustee with the External Secrets Operator

    • Implement zero-touch provisioning for OpenShift with GitOps

    • How the External Secrets Operator manages Quay credentials

    Recent Posts

    • Federated identity across the hybrid cloud using zero trust workload identity manager

    • Confidential virtual machine storage attack scenarios

    • Introducing virtualization platform autopilot

    • Integrate zero trust workload identity manager with Red Hat OpenShift GitOps

    • Best Practice Configuration and Tuning for Linux and Windows VMs

    What’s up next?

    Learn how to integrate Red Hat OpenShift, Submariner, OpenShift Service Mesh, and the Kubernetes Gateway API to build a resilient, full-mesh networking fabric for applications across multi-cluster and hybrid cloud environments.

    Start the learning path
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Chat Support

    Please log in with your Red Hat account to access chat support.