Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Question] A better way to handle deletion of sensitive data/files? #40

Closed
torresdal opened this issue Mar 8, 2020 · 1 comment
Closed
Labels
question Further information is requested
Milestone

Comments

@torresdal
Copy link
Collaborator

I've spent the weekend fixing and improving things around the env-injector. One of the tings that now seams to work fine, is removing sensitive files (the injector executable azure-keyvault-env and if running inside Azure without custom auth, the azure.json host file containing AKS credentials - ref #25 )

The main problem to solve, is that we don't know how much privileges (or which user) the executing container has, so my current solution is to chmod the /azure-keyvault directory and its files with 777 (ref: azure-keyvault-secrets-webhook) and then have the executing container (through the azure-keyvault-env executable) delete the files (ref: azure-keyvault-env) as soon as they are not needed anymore.

Even though these files only exist in a in-memory volume for a few milliseconds, it still feels weird to use 777.

Anyone have a better solution? Do you see any reel security issues with the current solution?

@torresdal torresdal added the question Further information is requested label Mar 8, 2020
@torresdal torresdal added this to the Version 1.1.0 milestone Mar 19, 2020
@torresdal
Copy link
Collaborator Author

Closing. A better solution will be available in v 1.1.0.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

1 participant