Controls/Credential Protection/5.5
L1 EssentialAutomated verification

5.5 Secrets Not Logged

5. Credential ProtectionHow do we protect secrets?

Description

Credentials MUST NOT appear in logs, error messages, or telemetry.

Rationale

Logs are often stored in less secure systems and accessed by broader teams.

Audit Procedure

1. Search logs for credential patterns
2. Trigger errors and check logs
3. Review logging configuration

Remediation

1. Implement log redaction
2. Use structured logging with field filtering
3. Review and scrub existing logs

Framework Mappings

CIS Control 8.3NIST PR.DS-5