论文标题

软件工件中秘密管理的实践是什么?

What are the Practices for Secret Management in Software Artifacts?

论文作者

Basak, Setu Kumar, Neil, Lorenzo, Reaves, Bradley, Williams, Laurie

论文摘要

在整个2021年,吉特加尔人对公共GitHub存储库的监视显示,与2020年相比,暴露的秘密数量(数据库凭据,API密钥和其他证书)增加了两倍,累积了超过600万个秘密。用于管理秘密的实践的系统推导可以帮助从业人员进行安全发展。我们论文的目的是通过系统地推导在互联网工件中传播的实践派生来确定软件工件中的秘密管理实践,以帮助从业者避免秘密的暴露。我们对互联网文物进行了灰色文献综述,例如博客文章以及问答帖子。我们确定了由开发人员和组织实践组成的六个类别中的24种实践。我们的发现表明,使用本地环境变量和外部秘密管理服务是将秘密移出源代码并安全存储秘密的最建议的做法。我们还观察到,使用版本控制系统扫描工具并采用短暂的秘密是避免不小心提出秘密并限制秘密暴露的最建议的做法。

Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. A systematic derivation of practices for managing secrets can help practitioners in secure development. The goal of our paper is to aid practitioners in avoiding the exposure of secrets by identifying secret management practices in software artifacts through a systematic derivation of practices disseminated in Internet artifacts. We conduct a grey literature review of Internet artifacts, such as blog articles and question and answer posts. We identify 24 practices grouped in six categories comprised of developer and organizational practices. Our findings indicate that using local environment variables and external secret management services are the most recommended practices to move secrets out of source code and to securely store secrets. We also observe that using version control system scanning tools and employing short-lived secrets are the most recommended practices to avoid accidentally committing secrets and limit secret exposure, respectively.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源