Are there any passwords/passphrases hard-coded into your systems or solutions?
Explanation
Example Responses
Example Response 1
No, our organization prohibits hard-coding passwords or passphrases into any systems or solutions We enforce this through multiple controls including: (1) Regular code reviews that specifically check for credential exposure, (2) Automated static code analysis tools that scan for potential credential strings in code, (3) A secrets management platform (HashiCorp Vault) that provides secure storage and retrieval of credentials at runtime, and (4) CI/CD pipeline checks that prevent code with potential credentials from being deployed All application and system credentials are stored in our secrets management platform and are retrieved at runtime through secure API calls with appropriate authentication.
Example Response 2
No, we do not allow hard-coded passwords in our systems Instead, we use AWS Secrets Manager to store all credentials securely Our applications retrieve credentials dynamically at runtime using IAM roles and temporary access tokens We have implemented a comprehensive secrets management policy that requires all credentials to be stored in the secrets management service, with appropriate access controls and audit logging enabled We conduct quarterly reviews of our codebase using both manual code reviews and automated scanning tools (Snyk and GitGuardian) to identify any potential credential exposure Any violations of this policy are treated as high-priority security incidents requiring immediate remediation.
Example Response 3
Yes, our current system does contain some hard-coded credentials in legacy components These instances have been identified through our security assessment process and are documented in our risk register Specifically, there are three internal microservices that contain database connection strings with embedded credentials in their configuration files We recognize this as a security vulnerability and have developed a remediation plan to eliminate these hard-coded credentials by the end of the current quarter The plan includes implementing a centralized secrets management solution (Azure Key Vault), refactoring the affected components to retrieve credentials at runtime, and implementing additional controls to prevent future instances of hard-coded credentials In the interim, we have implemented compensating controls including network segmentation, strict access controls to the configuration files, and enhanced monitoring of the affected systems.
Context
- Tab
- Product
- Category
- Authentication, Authorization, and Account Management

