This project is scheduled for transfer. Users with the Maintainer or Owner role will be notified when the transfer succeeds or fails.
[ComplianceBot] [CRITICAL] Hardcoded encryption keys in configuration file
## 🔴 Critical Security Finding **Control ID**: SOC2-CC6.1, ISO27001-A.10.1.1, PCI-DSS-3.5.3 **Severity**: CRITICAL **Source MR**: !10 **File**: `test_app/config.py` ### Description Hardcoded encryption keys detected: ENCRYPTION_KEY and JWT_SECRET in configuration file. This compromises data confidentiality and integrity. ### Impact - All encrypted data can be decrypted if code is compromised - JWT tokens can be forged - Violation of cryptographic key management policies - Compliance failures across SOC 2, ISO 27001, and PCI-DSS ### Remediation Steps 1. **Immediate**: Remove hardcoded encryption keys from code 2. **Immediate**: Rotate all encryption keys and JWT secrets 3. Use secure key management system (AWS KMS, Azure Key Vault, HashiCorp Vault) 4. Implement key rotation policy 5. Store keys encrypted with key-encrypting-key (KEK) 6. Use environment variables or secure configuration management 7. Re-encrypt all data with new keys ### Timeline **Deadline**: Immediate (0-24 hours) ### References - [OWASP Key Management Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Key_Management_Cheat_Sheet.html) - [PCI-DSS Requirement 3.5](https://www.pcisecuritystandards.org/) --- *Auto-generated by ComplianceBot | MR !10*
issue