How to address container manager password management findings
Question
My application (or microservice etc.) relies on the container manager to replace passwords when deployed to production but Fortify/CodeQL/Snyk is flagging this as an issue. How do I address this?
Answer
To show that passwords used by an application are managed securely the following criteria must be met:
- Requirement: The developer will need to provide documentation[1] that attests:
- The container hosting the application was instantiated using authorized[2] infrastructure configuration files, DevSecOps tool configuration scripts, and/or application run-time configuration scripts to ensure that the container data in question is protected from unauthorized access.
- Required system security monitoring and system configuration monitoring is being performed to ensure that passwords used by an application running in a container are protected from unauthorized access.
- Requirement: Any sensitive data such as passwords or keys should be encrypted and managed using for example Kubernetes secrets functionality[3] [4]
- Secrets must not be stored in container environment variables
- The developer must identify the secrets management technology used
[1] There are no specific presentation or content requirements for the above attestation documentation, aside from addressing the specific technical concerns.
[2] The VA office or organizational entity that provided the authorization must be identified in the attestation.
[3] This particular notional example’s functionality may not be sufficient based on project or ATO needs.
[4] The specific solution used for secrets management must be identified in the attestation or in a readme file.