Ensure that all the named values used to define secret data within Azure API Management policies are encrypted in order to prevent the exposure of credentials and secrets.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
You can define secret and confidential information for your Azure API Management services using named values. These are collections of name/value pairs that can be used to manage secrets across API configurations and policies. Named values can use plaintext values, secrets encrypted by Azure API Management, or secrets managed with Azure Key Vaults. Preventing exposure of credentials and secrets in Azure API Management using secrets ensures enhanced security by storing sensitive information in an encrypted format. This mitigates the risk of unauthorized access and data breaches, maintaining the confidentiality of crucial data and bolstering overall system integrity.
Audit
To determine if named values are encrypted in Azure API Management, perform the following operations:
Remediation / Resolution
With Azure API Management named values, secret data can be stored either as encrypted strings or by referencing secrets in Azure Key Vault. To ensure that your named values are encrypted to prevent the exposure of secrets, perform the following operations:
References
- Azure Official Documentation
- Use named values in Azure API Management policies
- How to set or edit Azure API Management policies