Secret model
Credential material is classified as high-value infrastructure state. Storage, injection, and rotation are all explicit and auditable.
Handling rules
- Never commit secrets into templates or runtime logs.
- Store credentials using provider-native secure storage.
- Automate expiration and replacement alarms.
Recovery path
If a secret exposure is suspected, rotate immediately, invalidate affected sessions, and run connector audit to verify no unauthorized writes occurred.
Rotation evidence
- Track secret version and rotation date on every environment.
- Record rotation verification event and downstream connector reconnect status.
- Revoke suspect tokens immediately on suspected exposure.