Database Credentials Coding Policy: 1. Overview
Database Credentials Coding Policy: 1. Overview
Database Credentials Coding Policy: 1. Overview
1. Overview
Database authentication credentials are a necessary part of authorizing application to connect to
internal databases. However, incorrect use, storage and transmission of such credentials could
lead to compromise of very sensitive assets and be a springboard to wider compromise within the
organization.
2. Purpose
This policy states the requirements for securely storing and retrieving database usernames and
passwords (i.e., database credentials) for use by a program that will access a database running on
one of <Company Name>'s networks.
Software applications running on <Company Name>'s networks may require access to one of the
many internal database servers. In order to access these databases, a program must authenticate
to the database by presenting acceptable credentials. If the credentials are improperly stored, the
credentials may be compromised leading to a compromise of the database.
3. Scope
This policy is directed at all system implementer and/or software engineers who may be coding
applications that will access a production database server on the <Company Name> Network.
This policy applies to all software (programs, modules, libraries or APIS that will access a
<Company Name>, multi-user production database. It is recommended that similar requirements
be in place for non-production servers and lap environments since they don’t always use
sanitized information.
4. Policy
General
In order to maintain the security of <Company Name>'s internal databases, access by software
programs must be granted only after authentication with credentials. The credentials used for this
authentication must not reside in the main, executing body of the program's source code in clear
text. Database credentials must not be stored in a location that can be accessed through a web
server.
Specific Requirements
The scope into which you may store database credentials must be physically separated
from the other areas of your code, e.g., the credentials must be in a separate source file.
The file that contains the credentials must contain no other code but the credentials (i.e.,
the user name and password) and any functions, routines, or methods that will be used to
access the credentials.
For languages that execute from source code, the credentials' source file must not reside
in the same browseable or executable file directory tree in which the executing body of
code resides.
[Add references to your site-specific guidelines for the different coding languages such as
Perl, JAVA, C and/or Cpro.]
5. Policy Compliance
5.1. Compliance Measurement
The Infosec team will verify compliance to this policy through various methods, including
but not limited to, business tool reports, internal and external audits, and feedback to the
policy owner.
5.1. Exceptions
Any exception to the policy must be approved by the Infosec team in advance.
5.2. Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to
and including termination of employment.
A violation of this policy by a temporary worker, contractor or vendor may result in the
termination of their contract or assignment with <Company Name>.
Any program code or application that is found to violate this policy must be remediated
within a 90 day period.
8. Revision History