Skip to content

Commit

Permalink
Mention sedgid and remove poor example
Browse files Browse the repository at this point in the history
  • Loading branch information
keymandll committed Jan 3, 2023
1 parent 680c9d8 commit 5bdf800
Showing 1 changed file with 1 addition and 2 deletions.
3 changes: 1 addition & 2 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,5 @@ You can prevent exploitation by hardening the environment in which the service i

If you have any YAML or JSON files the service must have access to that may contain sensitive information, such as configuration file(s), you must take additional measures to prevent exploitation. A non-exhaustive list:

* You can implement your service so that it reads the configuration into memory at start time, then uses [setuid](https://nodejs.org/api/process.html#processsetuidid) to set the process' UID to the ID of a user that has no access to the file on the filesystem
* You can implement your service so that it reads the configuration into memory at start time, then uses [setuid](https://nodejs.org/api/process.html#processsetuidid) and [setgid](https://nodejs.org/api/process.html#processsetgidid) to set the process' UID and GID to the ID of a user and ID of a group that has no access to the file on the filesystem
* Do not store sensitive information, such as credentials, in the service configuration files
* Store configuration files at a location that is difficult to guess

0 comments on commit 5bdf800

Please sign in to comment.