Almost every program that we run has access to the environment, so nothing stops them from curling our credentials to some nefarious server.

Why don't we put credentials in files and then pass them to the programs that need them? Maybe coupled with some mechanism that prevents executables from reading any random file except those approved.

  • blkpws@lemmy.ml
    ·
    1 year ago

    Environment variables can be set individually for each app, no need to set them globally. If you put credentials on files, that file can be read by any program also if you don't isolate it, as you should do with environment variables too.

  • erwan@lemmy.ml
    ·
    1 year ago

    If you run a binary written with bad intentions, you're doomed anyway.

    This is the security model we have currently.

  • bruce965@lemmy.ml
    ·
    1 year ago

    I suppose in a well configured Docker or Kubernetes environment this doesn't matter that much. Also, in Kubernetes, "secrets" can be passed as read-only files.

  • catchy_name@feddit.it
    ·
    1 year ago

    CyberArk is a commercial product that attacks this problem space. It puts an agent process on the host next to your app. Only processes whose fingerprint matches those authorized to access a credential are allowed to fetch it. That fingerprint can be based on the host (known list of production hosts), the os user ID that owns the pid, the path to the executable for the pid, and probably a few more items.

    Under that model your app just needs to know the environment that it wants (inject however you want) and the userid it wants to use. At runtime it reaches out to the local cyberark agent to obtain the password secret.