Skip to content

Commit 6941f05

Browse files
committed
Merged Secure secrets into APP_SECRET
1 parent 377d9c8 commit 6941f05

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

docs/infrastructure_and_maintenance/security/security_checklist.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,6 @@ This is specially important for admin accounts and other privileged users.
3636

3737
See [setting up password rules](passwords.md#password-rules).
3838

39-
### Secure secrets
40-
41-
Ensure all other secrets are similarly secured: Varnish invalidate token, JWT passphrase (if in use), and any other application-specific secrets.
42-
4339
### Protect against brute force attacks
4440

4541
Consider introducing a measure against brute force login attacks, like CAPTCHA.
@@ -150,9 +146,10 @@ Reduce your attack surface by exposing only what you must.
150146

151147
## Symfony
152148

153-
### `APP_SECRET`
149+
### `APP_SECRET` and other secrets
154150

155151
`APP_SECRET` needs to be a strong, random, securely stored value.
152+
This applies also to other secrets that may be in use, like the Varnish invalidate token, the JWT passphrase, and any other application-specific secrets.
156153

157154
- Don't use a default value like `ff6dc61a329dc96652bb092ec58981f7` or `ThisTokenIsNotSoSecretChangeIt`.
158155
- The secret must be secured against unwanted access. Don't commit the value to a version control system. There are several ways of handling it, like with enviroment variables or files like `.env.local`. Files are considered more secure. If you store the secrets in files, make sure to add those files to `.gitignore` or similar, so they will never be committed to version control systems.

0 commit comments

Comments
 (0)