Skip to content

[Security] NGFW SSH private key written to disk as plaintext #20

@Jberlinsky

Description

@Jberlinsky

Palo Alto NGFW initiation creates an SSH keypair and writes it to the local provisioning system's disk in plaintext, instructing the deployer to copy the keypair onwards to the bastion for further use. This presents unnecessary credential exposure risk.

To extend the reach of auditable access to the keypair, the keypair should be stored in Secret Manager with tightly scoped access, ideally just the bastion host's service account. Instructions should be updated to pull the keypair from Secret Manager.

While OS Login is not available for IL4/IL5 today, it should be the preferred authentication mechanism where possible, to avoid proliferation of long-lived plaintext credentials like SSH keypairs.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions