sops
TLDR
Encrypt file
$ sops -e [secrets.yaml] > [secrets.enc.yaml]
Decrypt file$ sops -d [secrets.enc.yaml]
Edit encrypted file$ sops [secrets.enc.yaml]
Encrypt with specific key$ sops -e --age [age-public-key] [file.yaml]
Rotate keys$ sops -r [secrets.enc.yaml]
Add KMS key$ sops --add-kms [arn:aws:kms:...] [file.yaml]
SYNOPSIS
sops [options] file
DESCRIPTION
sops (Secrets OPerationS) encrypts files while keeping their format intact. It encrypts values but leaves keys readable, making diffs and reviews practical.
The tool supports multiple key sources including AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.
PARAMETERS
-e, --encrypt
Encrypt file.-d, --decrypt
Decrypt file.-r, --rotate
Rotate data key.-i, --in-place
Modify file in place.--age key
Age public key.--pgp key
PGP fingerprint.--kms arn
AWS KMS key ARN.--gcp-kms resource
GCP KMS key.--azure-kv url
Azure Key Vault key.--input-type type
Input format.--output-type type
Output format.
CAVEATS
Requires key access for decryption. Multiple keys recommended for redundancy. Key rotation should be periodic. Some formats have limitations.
HISTORY
sops was created by Mozilla for managing secrets in configuration files. It emerged from needs at Mozilla and has been adopted widely for secrets management in GitOps workflows.
SEE ALSO
age(1), gpg(1), vault(1), sealed-secrets(1)


