Skip to content

Security: bordera-randy/devops-resources

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in this project, please report it responsibly.

Do not open a public issue for security vulnerabilities.

Instead, please send a description of the vulnerability to the project maintainers via a private channel. Include:

  • A description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact
  • Suggested fix (if any)

Security Best Practices for This Template

When using this template repository, follow these security best practices:

Terraform State

  • Store Terraform state in a remote backend with encryption enabled.
  • Enable state locking to prevent concurrent modifications.
  • Restrict access to the state storage account using RBAC.

Secrets Management

  • Never commit secrets, credentials, or sensitive data to version control.
  • Use Azure DevOps variable groups with secret variables for sensitive values.
  • Consider using Azure Key Vault for centralized secrets management.

Service Principals

  • Follow the principle of least privilege when assigning roles.
  • Rotate service principal credentials regularly.
  • Use managed identities where possible instead of service principals.

Pipeline Security

  • Enable branch policies requiring pull request reviews before merging to main.
  • Use deployment environments with approval gates for production changes.
  • Restrict pipeline permissions to only the resources needed.

Code Review

  • Require at least one reviewer for all pull requests.
  • Review Terraform plans before applying changes to production.
  • Use automated tools like tflint and checkov for static analysis.

There aren’t any published security advisories