Take control of your releases with a free, instant demo.

Launch Now
Enov8-Plugin

Ansible : How do I protect sensitive data with encrypted files

MAR, 2023

by Jane Temov.

 

Author Jane Temov

Jane Temov is an IT Environments Evangelist at Enov8, specializing in IT and Test Environment Management, Test Data Management, Data Security, Disaster Recovery, Release Management, Service Resilience, Configuration Management, DevOps, and Infrastructure/Cloud Migration. Jane is passionate about helping organizations optimize their IT environments for maximum efficiency.

One of the great things about Enov8 Environment Manager is our DevOps Management area. An area that allows you to add your favourite automation independent of language. This includes the ability to “plug in” some very cool IT  Automation tools like Ansible.

 

Enov8 IT & Test Environment Manager

*Innovate with Enov8

Streamlining delivery through effective transparency & control of your IT & Test Environments.

Ansible is an open-source automation tool used to manage and configure systems and applications. It uses a simple and powerful language to describe and automate IT workflows, making it easy to manage complex systems and processes with ease. Ansible is agentless, meaning it does not require any software or daemons to be installed on remote hosts, making it easy to deploy and use. With Ansible, IT teams can automate tasks such as configuration management, application deployment, and orchestration, allowing them to improve efficiency, reduce errors, and improve overall infrastructure reliability.

Evaluate Now

Protecting Sensitive Data with Encrypted Files

To protect sensitive data with encrypted files or elements in Ansible, you can use Ansible Vault. Ansible Vault is a feature in Ansible that allows you to encrypt sensitive data using a password, and then decrypt it when needed during playbook execution. Here are the steps to use Ansible Vault:

  1. Create a file that contains sensitive data, such as passwords, API keys, or private keys. For example, let’s say you have a file named secrets.yml that contains the following:

username: myusername
password: mypassword

  1. Encrypt the file using the ansible-vault command:

ansible-vault encrypt secrets.yml

This will prompt you to enter a password that will be used to encrypt the file.

  1. Edit your playbook to include the encrypted file.

For example, let’s say your playbook includes the following task:

# yaml
“ name: Configure the server
become: yes

vars:
my_username: “{{ username }}”
my_password: “{{ password }}”

template:
src: template.j2
dest: /etc/config.cfg

You can replace the username and password variables with the encrypted values by modifying the task as follows:

# yaml
“ name: Configure the server
become: yes
vars_files:
“ secrets.yml
vars:
my_username: “{{ username }}”
my_password: “{{ password }}”
template:
src: template.j2
dest: /etc/config.cfg

Note that we added the vars_files option to include the encrypted file.

 

  1. Run your playbook using the ansible-playbook command and provide the password for the encrypted file:

python ansible-playbook playbook.yml –ask-vault-pass

This will prompt you to enter the password* you used to encrypt the file.

Once you enter the password, Ansible will decrypt the file and use the values in your playbook.

Tip: *Parameterising the Ansible Secret

If you need to parameterise the secret then you can pass the password for the encrypted file as a parameter to the ansible-playbook command using the –vault-password-file option. For example, if your password is mysecretpassword, you can run the following command: ansible-playbook playbook.yml –vault-password-file=/path/to/password_file where /path/to/password_file is a file containing your password, such as: mysecretpassword. This can be particularly useful when you need to run the Enov8 environment automation on a schedule.

Add Parameter

With these steps, you can protect sensitive data in your Ansible playbooks using Ansible Vault.

Enov8, DevOps Manager: Screenshot

Enov8 DevOps Manager

Conclusion

In conclusion, Ansible Vault provides a powerful and flexible way to protect sensitive data in Ansible playbooks and configuration files. By encrypting sensitive data using strong encryption algorithms and protecting the decryption key with a password or key file, Ansible Vault helps ensure that critical data such as passwords, API keys, and other secrets are kept secure and confidential. Ansible Vault also integrates seamlessly with the rest of the Enov8 & Ansible automation framework, making it easy to incorporate secure credential management into your overall infrastructure management workflow. Overall, Ansible Vault is an essential tool for any organization that wants to ensure the security and integrity of its IT infrastructure and data.

Other TEM Reading

Interested in reading more about Test Environment Management. Why not start here:

Enov8 Blog: Your Essential Test Environment Management Checklist

Enov8 Blog: What makes a good Test Environment Manager

Enov8 Blog: Understanding the Types of Test Environments

 

Relevant Articles

PII Risk in AI Is an Architecture Problem

PII Risk in AI Is an Architecture Problem

AI is moving rapidly from experimentation into enterprise scale. Use cases are expanding, agents are emerging, and data is being pushed into pipelines at increasing speed. At the same time, organisations are trying to keep up with the associated risk. The response is...

What Is Enterprise Architecture Governance? A Complete Guide

What Is Enterprise Architecture Governance? A Complete Guide

Enterprise architecture rarely fails because of bad technology. It fails because of too many good decisions made in isolation. Modern enterprises operate across cloud platforms, SaaS tools, legacy systems, APIs, and data environments that evolve independently. This...

Why Do We Need Release Gates?

Why Do We Need Release Gates?

Before starting this topic on the importance of Release Gates, lets first understand – what is a Release Gate? A Release Gate can be defined as a milestone or health indicator of a release at that very point in time. Milestones are like stones placed beside a road to...

SQL Server Data Masking: A Complete Guide

SQL Server Data Masking: A Complete Guide

Imagine accidentally exposing thousands of customer records just because someone needed a database for testing. Scary, right?  Data security is one of the biggest challenges enterprises face when working with SQL Server.  This is where SQL Server data...

What is Data Risk Assessment? A Complete Introductory Guide

What is Data Risk Assessment? A Complete Introductory Guide

Data is vulnerable.  Every enterprise handles vast amounts of sensitive information, from customer personally identifiable information (PII) to financial records and proprietary business data.  Understanding where data is at risk and protecting it is...

AWS Data Masking: A Practical Guide

AWS Data Masking: A Practical Guide

One careless copy of production data in the cloud can expose sensitive customer information and trigger costly compliance violations. As organizations move more data into the cloud, it’s increasingly common to replicate production datasets across development, testing,...