Uploaded image for project: 'Red Hat Process Automation Manager'
  1. Red Hat Process Automation Manager
  2. RHPAM-4438

Sensitive Information In ENV And Pod Logs

XMLWordPrintable

    • 2022 Week 29-31 (from Jul 18), 2022 Week 32-34 (from Aug 8)

      The danger of using environment variables is that it's easy for the secrets to be accidentally leaked
      through logging, as it's common for software to log its entire environment. The set of people who
      have access to logs is often much bigger than the people who need production key values.
      For this reason, many security experts recommend using the volume-mount approach, where your
      code reads the secret value from a file in a well-known location. Most orchestrators support this
      method of passing secrets into a container.
      During pen test, it is observed that sensitive information like username and password are exposed in
      environment variable. An attacker can access env variable and retrieve the sensitive information.
      Username and password are exposed in pod logs

              dsalerno@redhat.com Davide Salerno (Inactive)
              aparedes@redhat.com Adriel Paredes
              Jakub Schwan Jakub Schwan
              Jakub Schwan Jakub Schwan
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: