When we talk about secret sprawl, we immediately think about API keys, passwords, credentials or any secret lurking in some source code. For sure, source code is very tightly linked to secret sprawl.
A few years ago, using containers to run your applications came with a number of security tradeoffs compared to using virtual machines. As enterprises started adopting various container technologies ...