This document discusses secrets management in containers. It recommends that secrets be encrypted at rest and in transit, and only accessible to containers that need them with write-only access controls. Secrets should also have lifecycle management like rotation, revocation and audit logging as the risk of a leak increases over time. The document reviews secrets management in Docker, Kubernetes, DC/OS, Nomad and Aqua and notes that the best approach depends on the orchestrator and acceptable risk level.