Encrypt CCE Secrets with Sealed Secrets
Managing sensitive data in Kubernetes clusters is a recurring challenge, especially when configuration needs to be versioned and shared across teams. Standard Kubernetes secrets are not designed for safe storage in source control, as they are only base64-encoded (not encrypted) and can be easily decoded back to plain text. This creates a gap between secure secret handling and common GitOps workflows.