Back to all scenarios
Scenario #247
Security
K8s v1.21, DigitalOcean

Exposure of Sensitive Logs Due to Misconfigured Logging Setup

Sensitive logs, such as those containing authentication tokens and private keys, were exposed due to a misconfigured logging setup.

Find this helpful?
What Happened

The logging setup was not configured to redact sensitive data, and logs containing authentication tokens and private keys were accessible to unauthorized users.

Diagnosis Steps
  • 1Inspected log configurations and found that logs were being stored without redaction or filtering of sensitive data.
  • 2Verified that sensitive log data was accessible through centralized logging systems.
Root Cause

Misconfigured logging setup allowed sensitive data to be stored and viewed without proper redaction.

Fix/Workaround
• Updated log configuration to redact or filter sensitive data, such as tokens and private keys, before storing logs.
• Implemented access controls to restrict who can view logs and what data is exposed.
Lessons Learned

Always ensure that sensitive data in logs is either redacted or filtered to prevent unintentional exposure.

How to Avoid
  • 1Configure logging systems to automatically redact sensitive data before storing it.
  • 2Apply access controls to logging systems to limit access to sensitive log data.