You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Using environment variables for configuration does not provide a secure way to manage Redis credentials.
I propose implementing a configuration file to prevent credentials from being accessible through the environment.
Please elaborate. Environment variables are an issue for systems with shared access, files are too. Environment variables will fall when the system is compromized, files will too. Environment variables can be injected by a wrapping process, files cannot.
So how would the security increase by writing the redis credentials into a file on disk in opposite to taking environment variables from a security store?
My concerns here are mainly with credentials ending up in crush dumps or similar.
I would prefer to pass the credentials at runtime via dedicated secrets management, but this is a bigger change.
The text was updated successfully, but these errors were encountered:
Mention of ps -eww - How should that expose env-vars? Okay if you put it into the CLI call it might (cannot reproduce as that's just plain stupid and nothing on my system uses that). When puttin them into through systemd / docker / k8s secrets they are not exposed.
Application outputting env for debugging… …eh, yeah… …OTS does not do this as the ENV contains secrets…
ENV passed to child procs - In Go you need to do that explicitly - also OTS has no child procs.
Moved from #177:
Using environment variables for configuration does not provide a secure way to manage Redis credentials.
I propose implementing a configuration file to prevent credentials from being accessible through the environment.
From Luzifer in #177:
I think the following holds some good arguments on why environment variables are sub optimal for secret storage: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data
My concerns here are mainly with credentials ending up in crush dumps or similar.
I would prefer to pass the credentials at runtime via dedicated secrets management, but this is a bigger change.
The text was updated successfully, but these errors were encountered: