rspec/rules/S7140/secrets/rule.adoc

43 lines
1.5 KiB
Plaintext
Raw Normal View History

include::../../../shared_content/secrets/description.adoc[]
== Why is this an issue?
include::../../../shared_content/secrets/rationale.adoc[]
If an attacker gains access to an SSLMate secret, they might be able to gain access to the SSL/TLS certificate of organisations.
=== What is the potential impact?
SSLMate provides APIs used by organizations to issue and monitor SSL/TLS certificates.
These certificates guaranty the authenticity of the organization's servers, and the confidentiality of the data exchanged with them.
Depending on the permission granted to the API key, an attacker could potentially create, revoke, or modify SSL/TLS certificates of the organization.
Creating certificates would allow attackers to impersonate the organization's servers. This leads to Man-In-The-Middle attacks that would
affect both the confidentiality and integrity of the communications from clients
to that server.
== How to fix it
include::../../../shared_content/secrets/fix/revoke.adoc[]
Also, revoke certificates that were issued since the leak. Doing so
will ensure that all people and assets that rely on these certificates are aware of its compromise and stop trusting it.
include::../../../shared_content/secrets/fix/recent_use.adoc[]
include::../../../shared_content/secrets/fix/vault.adoc[]
=== Code examples
:example_secret: k15341_bc5T6Zbfv5ozwrwb3qyn
:example_name: sslmate.api_key
:example_env: SSLMATE_API_KEY
include::../../../shared_content/secrets/examples.adoc[]
== Resources
include::../../../shared_content/secrets/resources/standards.adoc[]