Skip to content

Security Enhancement: Avoid writing sensitive config (e.g., passwords) to disk when using Environment Variables, especially for ephemeral environments like Kubernetes (K8s) #602

@joacatito

Description

@joacatito

Issue Summary:
When configuring Redis Commander connections using Environment Variables (which include passwords), the application currently writes a config file to disk containing the plain text password. This poses a security risk, particularly in ephemeral and containerized environments such as Kubernetes (K8s), where disk persistence is not guaranteed and security best practices dictate against storing sensitive information on disk.

Expected Behavior:
When connections are configured via Environment Variables, sensitive information (like passwords) should be stored in memory only for the duration of the application's runtime.
No config file or plaintext password storage on disk should occur in this setup to enhance security.

Use Case Affected:
Primarily affects deployments in Kubernetes (K8s) and similar container orchestration environments where security and compliance requirements are stringent, and the ephemeral nature of pods dictates against storing sensitive data on disk.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions