In our cloud-native world, secrets are liabilities: like API keys exposed in logs, vaulted credentials that never get revoked, or old tokens lying in backups. Each one is a ticking time bomb, waiting to be exploited.
As Felix Gaehtgens recently argued, the biggest challenge isn’t just storing secrets, but the bootstrap problem: how do you securely give a workload its first credential without already having one in place? SPIFFE’s vision — eliminating credential chaos by issuing short-lived, verifiable identities at runtime — is the right answer to that decades-old chicken-and-egg dilemma.
At Riptides, we share this vision. But we also believe that to make workload identity truly universal, it needs to be seamless, short-lived or ephemeral, automatic, and anchored where it can’t be bypassed: in the kernel.
Every secret comes with baggage:
As Felix noted, cloud IAM roles and service accounts work well within their boundaries. But outside those silos, teams fall back to vaults and static credentials, multiplying risk with every workload.
NHIM tools help organize the chaos, but they don’t eliminate it. Riptides flips the script: no secrets, no fragility, no leaks, just workload identity, reimagined in the kernel.
Instead of relying on “what you hold” (a password, a token), we look to “who you are” — and prove it continuously.
No vault. No tokens. Just cryptographic certainty tied directly to runtime provenance and purpose. Just workload identity reimagined at the kernel level.
SPIFFE provides the standard foundation: short-lived SVIDs, attestation, and universal trust. But in practice, most deployments bolt identity onto sidecars and proxies. This adds complexity, weakens trust boundaries, and creates friction that slows mass adoption.
In our post Rethinking Workload Identity at the Kernel Level, we argue that identity must be:
This makes workload identity invisible to developers, operationally effortless for teams, and universally enforceable.
SPIFFE has shown us the way: workload identity without static credentials is possible. The next step is making it automatic, seamless, and tied to the process itself — so that it scales across clouds, VMs, bare metal, and edge environments without operational burden.
Because in the post-credential era, identity isn’t something you distribute or rotate. It’s something you prove — cryptographically, continuously, and without secrets.