Announcement

Unveiling Nebula: An Open-Source MA-ABE Secrets Vault

Nebula is an open-source MA-ABE secrets vault offering granular access control, enhanced security, and secret management for developers and teams.

We’re excited to unveil Nebula, an open-source Multi-authority Attribute-Based Encryption secrets vault designed to revolutionize how developers and teams manage sensitive credentials. Being a MA-ABE at its core, this cutting-edge solution ensures maximum security while offering the flexibility to adapt to your workflow.

What is an MA-ABE Secrets Vault?

Multi-Authority Attribute-Based Encryption (MA-ABE) is an advanced encryption framework that provides highly granular access control. Unlike traditional encryption methods, MA-ABE allows permissions to be tied to specific attributes— such as roles, teams, or project requirements— enabling:
Fine-Grained Access Control: Ensure only authorized users or systems can access specific secrets.
Decentralized Security: Manage access across multiple projects and teams without a single point of failure.
Flexibility: Customize access policies to meet the unique needs of your organization.

Understanding the Flow of Nebula OpenSource: From Plaintext to Secure Access

Flowchart: Nebula system using attribute-based encryption & policies to control user data access.

The infographic above illustrates how Nebula OpenSource leverages Multi-Authority Attribute-Based Encryption (MA-ABE) to securely manage access to sensitive information. Here’s a breakdown of the flow, step-by-step:

1. Original Plaintext

Every security process starts with plaintext—unsecured, original data that needs protection. To ensure only the right individuals can access this data, a policy is created. This policy defines the conditions under which the data can be accessed, using attributes such as “department=IT” or “location=EU.”

2. Encryption

Once the policy is set, the plaintext is encrypted using public key encryption, entirely on the client side. This ensures that the data remains secure during the entire process, as it is never exposed in plaintext beyond the client device. The encryption process applies the policy to generate a ciphertext—a secured version of the original data. This end-to-end encryption (E2EE) guarantees that access is restricted solely to individuals who meet the policy criteria, providing a strong layer of security.

3. Storage in Nebula

The ciphertext, along with its defined policy, is stored within the Nebula OpenSource platform. Nebula acts as the central hub for managing encrypted data and ensuring that access control policies are consistently enforced.

4. Attribute Assignment and Private Keys

To enable access control, users are assigned specific attributes such as their role, department, or geographic location. These attributes are managed by a trusted external entity which is the "Authorization". Authorities (e.g., Authority A and Authority Z) are responsible for issuing private keys tailored to the assigned attributes, based on the tokens issued by the authorization. Each user receives a private key that determines whether they can decrypt specific ciphertexts.

5. Decryption Attempt

When a user attempts to access the encrypted data, Nebula evaluates the user’s attributes (via their private key) against the policy attached to the ciphertext. This is where the conditional access mechanism comes into play.

6. Access Outcomes

• Successful Decryption: If the user’s attributes meet the policy requirements (e.g., the user belongs to “department=IT” and is located in “EU”), Nebula grants access by decrypting the ciphertext into plaintext.

• Failed Decryption: If the user’s attributes do not satisfy the policy conditions, the decryption fails, and the plaintext remains securely inaccessible.

Why This Matters

Nebula OpenSource revolutionizes secret management by making access control both dynamic and attribute-driven. This approach ensures:

• Granular Control: Policies allow fine-tuned access control based on real-world user attributes.

• Enhanced Security: Data remains encrypted unless all access conditions are met.

• Scalability: The use of multiple authorities enables secure and efficient attribute management in complex environments.

Why Use Nebula OpenSource?

Completely Free: Enjoy enterprise-grade security features at no cost.

Advanced Encryption: Harness MA-ABE for cutting-edge access control and data protection.

Customizable and Transparent: Open-source flexibility lets you tailor the platform to your exact needs.

Community-Driven Innovation: Collaborate with a growing community enhancing the platform.

Scalable and Versatile: Perfect for projects of all sizes, from startups to enterprises.

Future-Ready Integration: Seamlessly works with tools like Docker, Kubernetes, GitHub, and more.

Key Features

While this is just the start, Nebula OpenSource already offers powerful capabilities to meet your secret management needs:

• MA-ABE Powered Security: Protect your secrets with Multi-Authority Attribute-Based Encryption for unmatched access control.

• Developer-Friendly CLI: Manage secrets seamlessly with our intuitive command-line interface.

• Scalable Architecture: Handle projects of any size, from solo developers to small teams, with ease.

Looking Ahead: Enhanced Tiers Coming Soon

While the OpenSource version is live today, we’re preparing to roll out additional tiers later this month. These premium options will build on the MA-ABE foundation and introduce features like:

1. Starter: A free plan for small teams, featuring a user-friendly UI/UX and support for up to 100 secrets and 5 users.

2. Essential: Perfect for growing teams, with scalable secret and user limits, extended audit logs, and priority support.

3. Enterprise: A fully customizable solution for large organizations, including advanced integrations, compliance tools, and 24/7 dedicated support.

Get Started with Nebula OpenSource

1. Visit Our GitHub Repository: Download the latest version of Nebula OpenSource and explore the documentation.

2. Join the Community: Share feedback, contribute to the codebase, and help shape the future of secret management.

3. Stay Tuned: Keep an eye out for our upcoming Starter, Essential, and Enterprise tiers, launching later this month.

Unlock AI-Driven Insights to Master Non-Human Identity Risk.

Go beyond basic data; unlock the actionable AI-driven insights needed to proactively master and mitigate non-human identity risk

A dark-themed cybersecurity dashboard from Cremit showing non-human identity (NHI) data analysis. Key metrics include “Detected Secrets” (27 new) and “Found Sensitive Data” (58 new) from Jan 16–24, 2024. Two donut charts break down source types of detected secrets and sensitive data by platform: GitHub (15k), GetResponse (1,352), and Atera (352), totaling 16.9k. The dashboard includes a line graph showing trends in sensitive data over time, and bar charts showing the top 10 reasons for sensitive data detection—most prominently email addresses and various key types (API, RSA, PGP, SSH).

Blog

Explore more news & updates

Stay informed on the latest cyber threats and security trends shaping our industry.

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Deep dive into OWASP NHI5 Overprivileged NHIs & AI. Learn causes, risks, detection, and mitigation strategies like CIEM, PaC, and JIT access.
Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Traditional NHI controls like rotation aren't enough. Discover why proactive, continuous secret detection is essential for securing modern infrastructure.
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Discover NHI sprawl vulnerabilities and how Cremit's detection tools safeguard your organization from credential exposure. Learn to manage NHI risks.
Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security
Delve into AI protocols MCP & A2A, their potential security risks for AI agents, and the increasing importance of securing Non-Human Identities (NHIs).
Stop Secrets Sprawl: Shifting Left for Effective Secret Detection
Leaked secrets threaten fast-paced development. Learn how Shift Left security integrates early secret detection in DevOps to prevent breaches & cut costs.
Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical
Learn critical strategies for detecting secrets in S3 buckets. Understand the risks of exposed NHI credentials & why proactive scanning is essential.
OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks
NHI2 Secret Leakage: Exposed API keys and credentials threaten your business. Learn how to prevent unauthorized access, data breaches, and system disruption.
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Cremit Launches AWS S3 Non-Human Identity (NHI) Detection to Boost Cloud Security
Human vs. Non-Human Identity: The Key Differentiators
Explore the critical differences between human and non-human digital identities, revealing hidden security risks and the importance of secret detection.
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Learn from the tj-actions/changed-files compromise: CI/CD non-human identity (NHI) security risks, secret theft, and proactive hardening.
OWASP NHI3:2025 - Vulnerable Third-Party NHI
Discover the security risks of vulnerable third-party non-human identities (NHI3:2025) and learn effective strategies to protect your organization from this OWASP Top 10 threat.
Build vs. Buy: Making the Right Choice for Secrets Detection
Build vs. buy secrets detection: our expert guide compares costs, features, and ROI for in-house and commercial security platforms.
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Bybit hacked! $1.4B crypto currency stolen! Exploited Safe{Wallet}, API key leak, AWS S3 breach? Exchange security is at stake! Check your security now!
Rising Data Breach Costs: Secret Detection's Role
Learn about the growing financial impact of data breaches and how secret detection and cybersecurity strategies can safeguard your data and business.
OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview
Discover how improper offboarding exposes credentials, leading to vulnerabilities like NHI sprawl, attack surface expansion, and compliance risks.
Behind the Code: Best Practices for Identifying Hidden Secrets
Improve code security with expert secret detection methods. Learn strategies to safeguard API keys, tokens, and certificates within your expanding cloud infrastructure.
Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats
Understanding NHI OWASP Top 10: risks to non-human identities like APIs and keys. Covers weak authentication, insecure storage, and more.
Securing Your Software Pipeline: The Role of Secret Detection
Prevent secret leaks in your software pipeline. Discover how secret detection improves security, safeguards CI/CD, and prevents credential exposure.
What Is Secret Detection? A Beginner’s Guide
Cloud security demands secret detection. Learn its meaning and why it's essential for protecting sensitive data in today's cloud-driven organizations.
Full Version of Nebula – UI, New Features, and More!
Explore the features in Nebula’s full version, including a refined UI/UX, fine-grained access control, audit logs, and scalable plans for teams of all sizes.
Unveiling Nebula: An Open-Source MA-ABE Secrets Vault
Nebula is an open-source MA-ABE secrets vault offering granular access control, enhanced security, and secret management for developers and teams.
Vigilant Ally: Helping Developers Secure GitHub Secrets
The Vigilant Ally Initiative supports developers secure API keys, tokens, and credentials on GitHub, promoting secure coding and secrets management.
Cremit Joins AWS SaaS Spotlight Program
Cremit joins the AWS SaaS Spotlight Program to gain insights through mentorship and collaboration, driving innovation in AI-powered security solutions.
DevSecOps: Why start with Cremit
DevSecOps is security into development, improving safety with early vulnerability detection, remediation, and compliance, starting with credential checks.
Credential Leakage Risks Hiding in Frontend Code
Learn why credentials like API keys and tokens are critical for access control and the risks of exposure to secure your applications and systems effectively.
Introducing Probe! Cremit's New Detection Engine
Probe detects exposed credentials and sensitive data across cloud tools, automating validation and alerts, with AI-powered scanning for enhanced security.
Customer Interview: Insights from ENlighten
We interviewed Jinseok Yeo from ENlighten, Korea’s top energy IT platform, on how they secure credentials and secrets. Here’s their approach to security.
6 Essential Practices for Protecting Non-Human Identities
Safeguard your infrastructure: Learn 6 best practices to protect API keys, passwords & encryption keys with secure storage, access controls & rotation.
Microsoft Secrets Leak: A Cybersecurity Wake-Up Call
See how an employee error at Microsoft led to the exposure of sensitive secrets and 38 terabytes of data.