since Kubernetes - configMaps store config data in un-encrypted format that’s where the need for the secrets comes from the need to store passwords and sensitive info in encoded files format
there are two ways to create a secrets
- imperative way without creating a secret definition file
- declarative way by creating a secret definition file
you can inject this into the pod yaml config
anyone able to create pods/deployments in the same namespace can access the secrets
consider third party secrets store provider like vault or GCP provider