From 427b4dbd497cf06aa411df686eafd47c2f618cce Mon Sep 17 00:00:00 2001 From: mickael-hc <86245626+mickael-hc@users.noreply.github.com> Date: Tue, 21 Mar 2023 14:14:00 -0400 Subject: [PATCH] security model updates (#19656) --- website/content/docs/internals/security.mdx | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/website/content/docs/internals/security.mdx b/website/content/docs/internals/security.mdx index c8bac254a..e900e34a0 100644 --- a/website/content/docs/internals/security.mdx +++ b/website/content/docs/internals/security.mdx @@ -75,6 +75,12 @@ The following are not considered part of the Vault threat model: credentials, they can access Vault with the level of privilege associated with this client. +- Protecting against Vault administrators supplying vulnerable or malicious configuration + data. Any data provided as configuration values to Vault's administrative endpoints + (e.g. [secret engines](/vault/docs/secrets) configurations), or Vault's + configuration files should be validated. If an attacker can write to Vault's + configuration, then the confidentiality or integrity of data can be compromised. + # External Threat Overview Vault architecture compromises of three distinct systems: