secrets

package
v0.6.9 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 7, 2022 License: MIT Imports: 4 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

View Source
var CheckNotExposed = rules.Register(
	rules.Rule{
		AVDID:       "AVD-GEN-0004",
		Provider:    provider.GeneralProvider,
		Service:     "secrets",
		ShortCode:   "no-plaintext-exposure",
		Summary:     "Secret/sensitive data should not be exposed in plaintext.",
		Impact:      "Sensitive data can be leaked to unauthorised people or systems.",
		Resolution:  "Remove plaintext secrets and encrypt them within a secrets manager instead.",
		Explanation: `Plaintext secrets kept in source code or similar media mean sensitive data is exposed to any users/systems with access to the source code.`,
		Links:       []string{},
		Terraform: &rules.EngineMetadata{
			GoodExamples:        terraformNoPlaintextExposureGoodExamples,
			BadExamples:         terraformNoPlaintextExposureBadExamples,
			Links:               terraformNoPlaintextExposureLinks,
			RemediationMarkdown: terraformNoPlaintextExposureRemediationMarkdown,
		},
		Severity: severity.Critical,
	},
	func(s *state.State) (results rules.Results) {

		return
	},
)

Functions

This section is empty.

Types

This section is empty.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL