Skip to main content
Organizations adopt different approaches to secrets management governance based on their security requirements, compliance obligations, and team structures. Infisical supports a spectrum of governance models—from fully centralized platform administration to team-driven self-service. This guide covers how to configure Infisical for different governance approaches and what tradeoffs to consider.

Understanding the Spectrum

Most organizations don’t operate at the extremes. Instead, they land somewhere on a spectrum between two models: Centralized Administration: A dedicated platform or security team controls project creation, access policies, integrations, and secret lifecycle management. Application teams consume secrets but don’t manage the underlying infrastructure. Self-Service: Teams have autonomy to create projects, manage their own access, configure integrations, and operate independently. Central teams provide guardrails and standards rather than direct management.
The right model depends on your regulatory environment, team maturity, organizational scale, and security posture. Highly regulated industries often lean toward centralized control, while organizations with mature DevOps practices may benefit from self-service with guardrails.

Organizational Structure

Project and environment structure is where governance decisions start to take shape.

Project Ownership

ApproachCentralizedSelf-Service
Project creationPlatform team creates all projects on behalf of application teamsTeams create their own projects as needed
Naming conventionsEnforced through process and templatesDocumented standards, team-enforced
Folder structurePredefined conventions (e.g., /apps/{app-name}/{component})Teams define hierarchies that fit their needs

Project Templates

Project Templates allow you to define standard environments, roles, and settings that are applied when creating new projects. This feature supports both governance models:
  • Centralized: Require all projects to use approved templates, ensuring consistent environment structures and role definitions across the organization
  • Self-Service: Provide templates as a starting point that teams can build upon, reducing setup time while allowing customization
Project Templates apply at creation time and don’t propagate changes to existing projects. Plan your template strategy before widespread adoption.

Environment Strategy

Environments define the deployment stages where secrets are managed.
  • Standardized environments (e.g., dev, staging, prod) provide consistency and simplify cross-team collaboration
  • Custom environments allow teams to model their specific deployment pipelines (e.g., qa, uat, perf-test, prod-eu, prod-us)
With Project Templates, you can enforce a base set of environments while optionally allowing teams to add additional ones.

Authentication and Identity

How you manage identity—both for users and machines—significantly affects your governance strategy.

User Authentication

ApproachCentralizedSelf-Service
Login methodsSSO enforced, local accounts disabledSSO available, local accounts permitted
MFARequired organization-wideEncouraged or optional
Session durationShort sessions enforcedLonger sessions permitted
Infisical supports multiple authentication methods that can be configured based on your requirements:
  • SAML SSO with providers like Okta, Azure AD, Google Workspace, and JumpCloud
  • OIDC SSO for standards-based authentication
  • LDAP for directory-based authentication

User Provisioning

ApproachCentralizedSelf-Service
User onboardingAutomatic via SCIM from identity providerDirect invitations by project admins
Role assignmentMapped from IdP groupsAssigned manually per project
OffboardingAutomatic deprovisioning via SCIMManual removal required
SCIM provisioning enables automatic user lifecycle management synced with your identity provider. Combined with group mappings, you can automatically assign organization roles based on IdP group membership. For organizations using SAML, group membership mapping synchronizes group memberships when users log in, ensuring access reflects current IdP state.

Machine Identity Management

Machine identities authenticate applications, services, and automated systems with Infisical. Your governance model shapes how these identities are managed:
ApproachCentralizedSelf-Service
Identity creationPlatform team creates all identities; teams submit requestsTeams create identities for their own projects
Auth method selectionStandardized methods enforced (e.g., “Kubernetes Auth only in production”)Teams choose methods appropriate to their infrastructure
Credential managementPlatform team manages and distributes credentialsTeams manage their own identity credentials
Infisical supports multiple machine identity authentication methods:
  • Universal Auth — Client ID/secret authentication for any environment
  • Kubernetes Auth — Native authentication using Kubernetes service accounts
  • AWS Auth — Authentication using AWS IAM roles
  • Azure Auth — Authentication using Azure managed identities
  • GCP Auth — Authentication using GCP service accounts
  • OIDC Auth — Authentication using OIDC identity tokens
Centralized organizations often standardize on platform-native authentication methods (Kubernetes Auth, cloud provider auth) to eliminate static credentials, while self-service models may permit Universal Auth for flexibility.

Access Control

Infisical’s role-based access control operates at two levels: organization and project. How you configure these controls determines who can do what across your secrets infrastructure.

Organization-Level Roles

Organization roles govern access to organization-wide resources like billing, member management, and identity provider configuration.
RoleCapabilities
AdminFull access to all organization settings and all projects
MemberBasic organization access; project access determined separately
Custom rolesTailored permissions for specific administrative functions
The Admin role grants access to all projects in the organization. In both governance models, this role should be assigned sparingly to prevent unintended access to sensitive secrets.

Project-Level Roles

Project roles control what users and machine identities can do within a specific project.
ApproachCentralizedSelf-Service
Role definitionCustom roles defined by platform team; teams assigned predefined rolesTeams create project-level custom roles as needed
Production accessRestricted to specific roles; requires approvalTeams determine their own access patterns
Role assignmentManaged through groups synced from IdPProject admins assign roles directly
Built-in project roles include:
  • Admin: Full access to all environments, folders, secrets, and project settings
  • Developer: Standard access with restrictions on project administration and policy management
  • Viewer: Read-only access to secrets and project resources
Custom roles let you define granular permissions for specific environments, folder paths, and actions—useful for implementing least-privilege access.

Groups

Groups simplify access management by allowing you to assign roles to collections of users rather than individuals. Key behaviors:
  • Adding a group to a project grants all group members access with the assigned role(s)
  • Users inherit composite permissions from all groups they belong to
  • Group membership can be managed locally or synced from your identity provider via SCIM
ApproachCentralizedSelf-Service
Group managementGroups defined in IdP, synced via SCIMProject admins create and manage local groups
Project membershipControlled through IdP group assignmentsDirect group/user additions by project admins

Temporary and Just-in-Time Access

For sensitive environments, both governance models benefit from time-limited access: Centralized organizations typically require temporary access for production environments, while self-service models may use it selectively for high-risk operations.

Approval Workflows

Approval workflows add oversight to sensitive operations, supporting compliance requirements and change management practices.

Change Policies

Change policies require approval before secrets can be modified in specific environments or folder paths. When a policy applies, proposed changes enter a review queue where designated approvers can approve and merge—or reject—the changes.
ApproachCentralizedSelf-Service
Policy scopeRequired for all production environmentsTeams define policies for their sensitive environments
ApproversSecurity team members or designated reviewersTeam leads or senior engineers
Bypass permissionsStrictly limitedMay allow emergency bypass for on-call

Access Requests

Access requests formalize the process of granting access to sensitive resources. Combined with temporary access, this enables just-in-time access patterns where users request and receive time-limited permissions.
ApproachCentralizedSelf-Service
Request requirementMandatory for production accessOptional or environment-specific
Approval workflowFormal review by security teamPeer approval or team lead sign-off
Access durationStrictly time-limitedFlexible based on need

Notifications

Approval workflows integrate with Slack and Microsoft Teams to notify approvers in real-time, reducing delays in the approval process.

Secret Lifecycle

Who creates, rotates, and retires secrets—and how—depends on your governance model.

App Connections

App Connections are reusable integrations with third-party platforms like AWS, GCP, Azure, databases, and other services. They’re required for secret rotation, dynamic secrets, and secret syncs—so how you manage them affects multiple workflows.
ApproachCentralizedSelf-Service
Connection creationPlatform team creates connections at the organization level and distributes access to projectsTeams create their own connections at the project level
Credential managementPlatform team manages service accounts and API keys used by connectionsTeams manage credentials for their own connections
Access distributionConnections shared across multiple projects as neededEach team maintains their own set of connections

Secret Creation and Ownership

ApproachCentralizedSelf-Service
Shared secretsPlatform team provisions infrastructure secrets (databases, APIs)Teams request or create their own
Application secretsTeams manage within their designated pathsTeams have full ownership
Secret standardsNaming conventions and metadata requirements enforcedGuidelines provided, team-enforced

Secret Rotation

Secret rotation automates credential lifecycle management, reducing the risk of long-lived secrets.
ApproachCentralizedSelf-Service
Rotation policiesDefined and managed by platform teamTeams configure for their services
Rotation schedulesStandardized intervals based on secret classificationTeams determine appropriate intervals

Dynamic Secrets

Dynamic secrets generate short-lived credentials on demand, eliminating standing access to sensitive systems.
ApproachCentralizedSelf-Service
ConfigurationPlatform team sets up dynamic secret sourcesTeams configure for their databases and services
Lease durationStandardized TTLs based on use caseTeams determine appropriate durations
Access controlRestricted to specific rolesAvailable to authorized team members

Secret Referencing Within Projects

Secret referencing and imports allow secrets to be shared across environments and folders within the same project. This helps reduce duplication when the same secret is needed in multiple environments.
ApproachCentralizedSelf-Service
Reference patternsStandardized import structures across projectsTeams define their own reference hierarchies
Base environmentPlatform team designates source environments for importsTeams choose which environments to reference from
Projects in Infisical are isolated from one another. Secret referencing and imports work within a single project—you cannot reference secrets across different projects.

Integrations and Secret Delivery

Infisical offers multiple methods for delivering secrets to applications and infrastructure.

Secret Syncs

Secret Syncs push secrets to third-party platforms like AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, and others. Syncs keep external secret stores updated when values change in Infisical.
ApproachCentralizedSelf-Service
Sync setupPlatform team configures syncs to approved destinationsTeams configure syncs for their projects
Target platformsLimited to approved platformsTeams choose appropriate destinations
Sync scopeStandardized patterns (e.g., sync prod to AWS SM only)Teams determine what to sync and where

Kubernetes Integration

For Kubernetes environments, two primary integration patterns are available:
ApproachCentralizedSelf-Service
Operator deploymentSingle cluster-wide instance managed by platform teamTeams may deploy namespace-scoped instances
Secret sync patternsStandardized CRD configurationsTeams define their own InfisicalSecret resources

Agent and CLI

The Infisical Agent and CLI provide flexible secret consumption patterns:
ApproachCentralizedSelf-Service
Agent deploymentManaged by platform team as infrastructureTeams deploy and configure their own agents
CLI usageStandardized configurations providedTeams use CLI as needed in their workflows

Gateways

Gateways enable Infisical to securely access private resources—such as databases in isolated VPCs—without exposing them to the public internet. Gateways are lightweight components deployed within your private network that establish secure, outbound-only connections to Infisical. Gateways are essential for features that require direct access to private infrastructure:

Gateway Architecture

Gateways operate at two levels within Infisical:
  1. Organization-level registration: Gateways are registered and visible in Organization Settings → Access Control → Gateways. This provides central visibility into all gateway infrastructure.
  2. Project-level linking: When configuring features like dynamic secrets, teams select from available gateways to route requests through private networks.
This architecture naturally supports a hybrid governance model where infrastructure teams manage gateway deployment while application teams consume them.

Governance Considerations

ApproachCentralizedSelf-Service
Gateway deploymentPlatform/infrastructure team deploys gateways in shared network zonesTeams deploy gateways in their own VPCs or network segments
Machine identity managementPlatform team creates and manages identities used by gatewaysTeams create identities for gateways they deploy
Network configurationCentral team manages firewall rules and network connectivityTeams responsible for their own network access
Gateway selectionPlatform team links gateways to projectsTeams select from available gateways when configuring features
Each gateway requires a machine identity for authentication. Your gateway governance model should align with your broader machine identity strategy.

Common Patterns

Shared Gateway Model (Centralized) A platform team deploys gateways in shared network zones that can reach common infrastructure (e.g., a central database cluster). Multiple projects link to these shared gateways, reducing deployment overhead and centralizing network management. This pattern works well when:
  • Multiple applications share common database infrastructure
  • Network access is controlled by a central team
  • You want to minimize the number of gateway deployments to manage
Team-Owned Gateway Model (Self-Service) Each team deploys gateways within their own network boundaries (e.g., per-team VPCs or Kubernetes namespaces). Teams manage the full lifecycle of their gateways, including the machine identities that authenticate them. This pattern works well when:
  • Teams have isolated network environments
  • Teams have infrastructure expertise to deploy and maintain gateways
  • Strict network segmentation requires dedicated gateways per team
Hybrid Model Platform team deploys and registers gateways, but application teams independently select which gateway to use when configuring dynamic secrets or rotation. This provides central oversight of infrastructure while giving teams flexibility in how they use it. For Kubernetes environments, gateways can also serve as token reviewers for Kubernetes Auth, eliminating the need for long-lived service account tokens. In this scenario, the gateway deployment often aligns with whoever manages the Kubernetes cluster.

Audit and Compliance

Visibility into secrets access and changes is critical for security and compliance. Infisical provides audit capabilities at both organization and project levels.

Audit Logs

Audit logs capture all platform activity including secret access, modifications, and administrative actions.
LevelScopeTypical Access
OrganizationAll activity across all projectsSecurity team, compliance officers
ProjectActivity within a specific projectProject admins, team leads
ApproachCentralizedSelf-Service
Log accessSecurity team has organization-wide visibilityTeams access only their project logs
Log retentionCentrally managed retention policiesPlatform-defined retention
Compliance reportingPlatform team generates reportsTeams may generate their own project reports

Audit Log Streaming

Audit log streaming exports logs to external systems for long-term retention and analysis. Supported destinations include:
  • SIEM platforms (Splunk, Datadog, Elastic)
  • Cloud storage (AWS S3, Azure Blob Storage)
  • Log aggregators (Better Stack, generic HTTP endpoints)
ApproachCentralizedSelf-Service
Stream configurationPlatform team manages all log streamsN/A (organization-level feature)
SIEM integrationCentralized security monitoringTeams may not have direct SIEM access

Security Controls

Beyond access control, Infisical offers additional security settings.

Security Policies

Organization-level security policies allow you to enforce:
  • MFA requirements for all users
  • Session duration limits
  • Login restrictions

IP Access Controls

Restrict API and dashboard access to specific IP ranges, useful for:
  • Limiting production access to corporate networks or VPNs
  • Restricting machine identity authentication to known infrastructure IPs

Encryption and Key Management

FeatureDescriptionGovernance Consideration
External KMSIntegrate with AWS KMS, GCP KMS, or Azure Key VaultCentralized key management
BYOKBring your own encryption keysEnterprise key management policies
KMIPConnect to KMIP-compatible HSMsHardware-backed security requirements
These features are typically managed centrally regardless of overall governance model, as encryption infrastructure requires specialized expertise.

Choosing Your Model

A few factors tend to push organizations toward one end of the spectrum or the other:

Factors Favoring Centralized Control

  • Regulatory requirements: SOC 2, HIPAA, PCI-DSS, and similar frameworks often require demonstrated control over secrets management
  • Limited security expertise: When application teams lack security experience, central management reduces risk
  • Consistency requirements: Large organizations benefit from standardized patterns across teams
  • High-risk environments: Financial services, healthcare, and government contexts often require strict oversight

Factors Favoring Self-Service

  • Mature DevOps culture: Teams with strong security awareness can manage their own secrets responsibly
  • Speed of delivery: Self-service reduces bottlenecks and accelerates development cycles
  • Diverse technology stacks: Teams using different platforms benefit from flexibility in integration choices
  • Distributed organizations: Global teams may need autonomy to operate across time zones

The Hybrid Approach

Most organizations benefit from a hybrid model that combines central guardrails with team autonomy: Platform team responsibilities:
  • SSO and SCIM configuration
  • Project template creation and maintenance
  • Organization-wide security policies
  • Audit log streaming and compliance reporting
  • Approval workflow policies for production environments
  • Shared infrastructure secrets (databases, external APIs)
Application team responsibilities:
  • Project creation (from approved templates)
  • Application-specific secret management
  • Integration configuration within their projects
  • Team-level access control within policy bounds
  • Secret rotation for team-owned credentials
This balances compliance requirements with team velocity—central teams handle the infrastructure and guardrails, while application teams own their day-to-day secrets operations.

Implementation Considerations

Starting Centralized, Moving to Self-Service

Organizations often begin with centralized control and gradually extend autonomy as teams demonstrate security maturity:
  1. Phase 1: Platform team manages all aspects; teams consume secrets via provided integrations
  2. Phase 2: Teams gain ability to manage secrets within their projects; platform team controls project creation and policies
  3. Phase 3: Teams can create projects from templates and configure integrations; platform team focuses on guardrails and compliance

Starting Self-Service, Adding Controls

Organizations scaling from startup to enterprise may need to add centralization:
  1. Phase 1: Establish SSO and basic security policies
  2. Phase 2: Introduce project templates and approval workflows for production
  3. Phase 3: Implement SCIM provisioning and comprehensive audit streaming

Documentation and Training

Regardless of model, invest in:
  • Clear documentation of secrets management standards and processes
  • Training for teams on Infisical features and security best practices
  • Runbooks for common operations (secret rotation, access requests, incident response)

Summary

Here’s a quick reference for how key Infisical features map to each governance model:
FeatureCentralized UseSelf-Service Use
Project TemplatesEnforce standardsProvide starting points
SCIMAutomate user lifecycleSupplement direct invitations
GroupsIdP-synced membershipLocal team management
Custom RolesDefine organization-wideCreate project-specific
Approval WorkflowsRequire for all changesApply selectively
App ConnectionsOrg-level connections distributed to projectsTeams create project-level connections
Secret SyncsPlatform-managed syncs to approved destinationsTeams configure their own syncs
GatewaysShared infrastructure for private accessTeam-deployed per network zone
Audit LogsCentralized monitoringProject-level visibility
Most organizations land somewhere in between—central control over identity, policies, and infrastructure with team ownership of secrets and integrations. You can start at either end of the spectrum and adjust as your needs change.