We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
Impersonation in Data Engineering: No More Credentials in Your Code! — Marian Špilka
Learn how to eliminate credentials from your code using impersonation in cloud environments. Covers IAM, workload identity federation, and secure access patterns.
-
Impersonation allows applications to securely access cloud resources without storing credentials in code by letting them act under different identities
-
Solution rests on four main pillars:
- Identity and Access Management (IAM)
- Application Default Credentials
- Workload Identity Federation
- Impersonation Feature
-
Key benefits:
- No credentials stored in code
- Code can be safely versioned in Git
- Reduced service desk requests
- Faster developer onboarding
- Production remains secure
-
Implementation rules:
- Production service account can only access production services
- Create empty avatar service accounts for testing
- Applications can run under developer identity locally
- Use Docker volume sharing to transfer credentials
-
Security improvements:
- Clear separation between test and production environments
- No shared credentials
- Automated access management during onboarding
- Transparent access control
- No need for credential rotation
-
Solution works well for:
- Kubernetes deployments
- Cloud-based applications
- Data engineering pipelines
- Multi-project environments
- Teams handling sensitive data
-
Process flow:
- Developer logs in locally
- Application gets appropriate credentials automatically
- Impersonation allows access to test services
- Production remains isolated and secure