Member-only story
In regulated industries, where trust is paramount, the security of CI/CD pipelines is a non-negotiable priority. Breaches within these pipelines can expose sensitive customer data and disrupt critical services, leading to devastating consequences. Traditional methods of storing long-lived credentials directly within the pipeline configuration create a vulnerability that erodes this trust. OpenID Connect (OIDC) offers a robust solution for secure authentication, and this article explores its implementation within a GitHub workflow using Terraform for provisioning resources on AWS.
The inherent risks of hardcoded credentials
Traditionally, CI/CD pipelines relied on storing long-lived credentials, such as API keys and passwords, directly within the pipeline configuration. This approach introduces several security risks that threaten the integrity of regulated institutions:
- Exposure through leaks: Accidental leaks or compromised CI/CD systems can expose these credentials, granting unauthorised access to critical infrastructure and sensitive data.
- Static targets: Static credentials remain vulnerable for extended periods, as rotating them regularly becomes a logistical challenge.