Skip to main content

💼 [CodeBuild.1] CodeBuild Bitbucket source repository URLs should not contain sensitive credentials

  • Contextual name: 💼 [CodeBuild.1] CodeBuild Bitbucket source repository URLs should not contain sensitive credentials

  • ID: /frameworks/aws-fsbp-v1.0.0/codebuild/01

  • Located in: 💼 CodeBuild

Description

Sign-in credentials shouldn't be stored or transmitted in clear text or appear in the source repository URL. Instead of personal access tokens or sign-in credentials, you should access your source provider in CodeBuild, and change your source repository URL to contain only the path to the Bitbucket repository location. Using personal access tokens or sign-in credentials could result in unintended data exposure or unauthorized access.

Similar

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST SP 800-53 Revision 5 → 💼 SA-3 System Development Life Cycle34
💼 PCI DSS v3.2.1 → 💼 8.2.1 Using strong cryptography, render all authentication credentials unreadable during transmission and storage on all system components.14
💼 PCI DSS v4.0.1 → 💼 8.3.2 Strong cryptography is used to render all authentication factors unreadable during transmission and storage on all system components.14

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS CodeBuild Project Bitbucket Source Location URL contains credentials 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-cc74149f1