Security Onboarding 🧑‍💻

Setup

  • Secret Rotation:
    • It’s a common ask of the Security team to rotate or help rotate production secrets. We have extensive documentation about Secret Management at Sourcegraph. Don’t worry about how to create new secrets unless you’re interested in the setup. For now what matters is focusing on the Rotating Secrets and Secret Types sections.
    • The goal is rotating two production secrets. You can choose any in these categories:
      • A secret in sourcegraph.com site-config: Sourcegraph instances may contain secrets such as OAuth creds in the site-config file. Choose one secret from dotcom’s site-config and rotate. Hint: Avoid the GitLab OAuth creds - go for GitHub OAuth or SMTP credentials.
      • Any secret in our production pods or CI: Besides site-config, it’s important to know how to rotate secrets that we use as env vars in our pods. Look for any secrets that you think are a good idea to rotate in the deploy-sourcegraph-dotcom or infrastructure repositories. This search can serve as a starting point to find some secrets to rotate.
    • This requires having completed the set up part of your Security onboarding. Dig through our code, GCP, 1Password and especially the Secret Management doc.

Acceptance Criteria

  • You are able to run Sourcegraph code locally with dev-private
  • You are able to run tf plan on the sourcegraph/infrastructure repository
  • You are able to kubectl into our clusters
  • Complete hands on tasks assigned to you as a starter task
  • Capture traffic via Burpsuite for analysis
  • Rotated secrets per instructions above