Security Considerations
Security Considerations
Threat Model
Threats Mitigated:
-
VPS Compromise - Credentials stored in Vault, not on VPS
-
Credential Theft - Encrypted before Vault storage (AES-256-GCM)
-
Unauthorized Access - Role-based access control with re-authentication
-
Insider Threats - Comprehensive audit trail tracks all access
-
Credential Aging - Automated 180-day rotation policy
Residual Risks:
-
Vault Compromise - If Vault is compromised, encrypted credentials exposed (mitigated by encryption)
-
Encryption Key Theft - If encryption key stolen, credentials can be decrypted (mitigated by key rotation)
-
Admin Account Compromise - Compromised admin can access credentials (mitigated by re-authentication, audit trail)
Best Practices
-
Principle of Least Privilege
-
Only
platform-adminandsupport-teamroles can access credentials -
Re-authentication required for every access
-
Time-limited access (15 minutes)
-
-
Defense in Depth
-
Multiple layers: Vault access control + encryption + re-authentication + audit logging
-
No single point of failure
-
Assume breach mentality
-
-
Audit Everything
-
All credential access logged
-
Monitor for suspicious activity
-
Alert on anomalies
-
-
Rotate Regularly
-
Automated 180-day rotation
-
Manual rotation capability
-
Emergency reset workflow
-
-
Test Recovery
-
Quarterly disaster recovery drills
-
Verify backup restoration
-
Document recovery procedures
-