Source Summary: Zero Credentials on Disk
Source Identity
- title:
Zero Credentials on Disk: Rewriting TazPod with AWS IAM Identity Center - type: blog post
- path:
blog-src/content/posts/tazpod-zero-credentials-aws-sso/index.md - date published: 2026-03-22
Scope
Implementation chronicle of the TazPod migration away from Infisical toward AWS IAM Identity Center and S3-backed vault recovery.
Key Points
- TazPod removed the old Infisical integration rather than keeping compatibility leftovers.
- the operator secret model moved toward AWS SSO plus S3-backed encrypted vault recovery
~/.awshandling required careful separation between workspace symlink behavior and vault bind-mount behavior- the resulting model is explicitly built around zero long-lived credentials on disk in the runtime image
Notable Claims
- design integrity required total removal of superseded secret-management code instead of partial deprecation
- the durable bootstrap anchor is the encrypted vault object in S3 rather than static credentials in the image or repository
Affected Wiki Pages
Open Questions
- Which additional TazPod milestone posts should be summarized next to complete the operator-environment narrative?