Skip to main content

Google Secret Manager Integration

GGScout supports integration with Google Secret Manager to collect and monitor your secrets. This guide will help you set up and configure the integration.

Supported Features

  • Multiple secret versions collection
  • Service account authentication
  • Project-specific secret collection
  • IAM role-based access

Configuration

To configure GGScout to work with Google Secret Manager, add the following configuration to your ggscout.toml file:

[sources.gcp]
type = "gcpsecretmanager"
fetch_all_versions = true
projects = ["some-project-id-441517"]
service_account_key_file = ".secure_files/.gcp_key.json"

Configuration Parameters

ParameterDescriptionRequired
typeMust be set to "gcpsecretmanager"Yes
fetch_all_versionsWhether to collect all versions of secretsNo
projectsList of GCP project IDs to collect secrets fromYes
service_account_key_filePath to the service account key fileYes

Authentication

GGScout supports multiple authentication methods for Google Cloud:

  1. Service Account Key: Using a JSON key file
  2. Application Default Credentials: When running on GCP infrastructure
  3. Environment Variables: Using standard GCP environment variables

Environment Variables

  • GOOGLE_APPLICATION_CREDENTIALS: Path to the service account key file
  • GOOGLE_CLOUD_PROJECT: The GCP project ID

Best Practices

  1. Use Application Default Credentials when running on GCP infrastructure
  2. Follow the principle of least privilege for IAM permissions
  3. Enable fetch_all_versions to track changes in your secrets over time
  4. Store service account keys securely
  5. Regularly rotate service account keys
  6. Use separate projects for different environments