-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
As a security officer, I can audit secret access to track which workspaces have accessed what secrets and when so that I can investigate any malicious behavior or infiltration event.
Event Type | Details to Log |
---|---|
Secret Injection as ENV variable or file | User ID and name, Workspace ID and name, Timestamp (UTC), Secret name, Secret scope (User, Template, or Organization) |
Secret Create/Update via CLI/API | User ID and name of initiator, ID and Name of the User/Template/Organization of the secret owner, Timestamp (UTC), Secret name |
Secret Deletion via CLI/API | User ID and name of initiator, ID and Name of the User/Template/Organization of the secret owner, Timestamp (UTC), Secret name |
- Example: Workspace
dev
started at 0500 and had accessed(injected as env variables)SECRET_A
,SECRET_B
- Example: A user
atif
in workspacedev
accessed personal secretSECRET_C
at 0900 (CLI or API) - Example: A user
atif
in workspacedev
accessedSECRET_C
from at 0900 (CLI or API) - Example: A user
atif
in workspacedev
updatedSECRET_A
at 1000 (CLI or API) - Example: A user
atif
in workspacedev
deletedSECRET_B
at 0900 (CLI or API)
We will de-duplicate secret access logs similar to how we currently deal with workspace app connection logging.
Metadata
Metadata
Assignees
Labels
No labels