Security credentials are the objects that should be removed first prior to uploading code to public code repositories. Security credentials are any data or information that can be used to authenticate or authorize a user or a system, such as passwords, keys, tokens, certificates, or hashes. Security credentials should never be exposed or stored in plain text in the source code, as they can be easily compromised by attackers who can access the public code repositories. Security credentials should be removed or replaced with dummy values before uploading code to public code repositories, and stored securely in a separate location, such as a vault or a configuration file. References: CISSP All-in-One Exam Guide, Eighth Edition, Chapter 8: Software Development Security, page 419; [Official (ISC)2 CISSP CBK Reference, Fifth Edition, Chapter 8: Software Development Security, page 559]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit