-
Notifications
You must be signed in to change notification settings - Fork 3.3k
Description
Community Note
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request.
Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request.
If you are interested in working on this issue or have submitted a pull request, please leave a comment.
Description
Change the ordering of the credential documentation to have Static Credentials listed last and add warnings about checking credentials into public VCS. There is a massive amount of cloud credential leakage caused by people accidentally checking their cloud credentials into public VCS repos. Our documentation lists Static Credentials as the first option and does not warn folks that checking in admin credentials is a sure-fire way of mining some form of crypto-currency within minutes, often at great cost to an organization.
We should order our cloud credential configurations in list of most-to-lease secure as well as describe the benefits of using particular patterns. We should also clearly warn folks what can happen if they check credentials into public VCS repos.