Secure Architecture, Storage, and Operations
Encrypt TOTP secrets at rest using a dedicated KMS or HSM, rotate wrapping keys, and segregate access by role. Never log secrets or OTPs. Scrub memory, pin dependencies, and perform regular key custodial reviews. Comment if you need a minimal, auditable blueprint to start.
Secure Architecture, Storage, and Operations
For TOTP, tolerate small clock drift with sliding windows, but throttle retries and lock out after suspicious patterns. Bind OTP verification to user session context and IP reputation. Encourage NTP discipline everywhere. Ask your SREs to share their time-sync practices for peer learning.