This is about … .
- Don’t embed keys into the source code.
- Search the code for
password
andsecret
.
- Search the code for
- Use different keys for different applications.
- Rotate them ðŦ
- Remove unused ones
- MFA for the most sensitive operations (write, execute). Read operations are optional.