-
Notifications
You must be signed in to change notification settings - Fork 4
Governance Anti Patterns Security
Credentials, secrets, and insecure configuration detection
Domain: security
| Check | Description |
|---|---|
| ANTI-SEC-001 | Possible credential/secret in output — use managed identity instead of connection strings or keys. |
| ANTI-SEC-002 | Admin credentials detected — disable admin user and use managed identity with AcrPull role assignment. |
| ANTI-SEC-003 | Possible hardcoded value detected — externalize to Key Vault or use variables. |
| ANTI-SEC-004 | Encryption at rest is disabled — enable TDE for SQL, SSE for Storage. |
| ANTI-SEC-005 | Sensitive value in Terraform output — remove the output or add sensitive = true. |
| ANTI-SEC-006 | Deprecated sensitive output detected — remove the output entirely instead of adding a warning comment. |
| ANTI-SEC-007 | Overprivileged role assignment detected — use the most specific built-in role at the narrowest scope. |
Possible credential/secret in output — use managed identity instead of connection strings or keys.
Rationale: Connection strings and access keys are shared secrets that cannot be scoped to specific identities, automatically rotated, or audited through Entra ID.
Agents: terraform-agent, bicep-agent, app-developer, csharp-developer, python-developer
| Services | Triggers On | Correct Patterns |
|---|---|---|
| *All* |
|
|
Admin credentials detected — disable admin user and use managed identity with AcrPull role assignment.
Rationale: Admin credentials are shared secrets that cannot be scoped per-service and bypass RBAC audit trails.
Agents: terraform-agent, bicep-agent
| Services | Triggers On | Correct Patterns |
|---|---|---|
|
|
|
Possible hardcoded value detected — externalize to Key Vault or use variables.
Rationale: Hardcoded values in code cannot be rotated and are permanently exposed in source control history.
Agents: terraform-agent, bicep-agent, app-developer, csharp-developer, python-developer
| Services | Triggers On | Correct Patterns |
|---|---|---|
| *All* |
|
|
Encryption at rest is disabled — enable TDE for SQL, SSE for Storage.
Rationale: Disabled encryption exposes data if storage media is compromised or improperly decommissioned.
Agents: terraform-agent, bicep-agent
| Services | Triggers On | Correct Patterns |
|---|---|---|
|
|
|
Sensitive value in Terraform output — remove the output or add sensitive = true.
Rationale: Terraform outputs are stored in plaintext state files — sensitive values are visible to anyone with state access.
Agents: terraform-agent
| Services | Triggers On | Correct Patterns |
|---|---|---|
| *All* |
|
|
Deprecated sensitive output detected — remove the output entirely instead of adding a warning comment.
Rationale: Outputs marked with "DO NOT USE" or "DEPRECATED" should be removed entirely, not left with warnings.
Agents: terraform-agent
| Services | Triggers On | Correct Patterns |
|---|---|---|
| *All* |
|
|
Overprivileged role assignment detected — use the most specific built-in role at the narrowest scope.
Rationale: Owner and Contributor roles grant full control — service identities should use the most specific data-plane role at the narrowest scope.
Agents: terraform-agent, bicep-agent
| Services | Triggers On | Correct Patterns |
|---|---|---|
|
|
|
Getting Started
Stages
Interfaces
Configuration
Agent System
Features
- Backlog Generation
- Cost Analysis
- Error Analysis
- Docs & Spec Kit
- MCP Integration
- Knowledge System
- Escalation
Quality
Help
Policies — Azure
AI Services
Compute
Data Services
- Azure SQL
- Backup Vault
- Cosmos Db
- Data Factory
- Databricks
- Event Grid
- Event Hubs
- Fabric
- IoT Hub
- Mysql Flexible
- Postgresql Flexible
- Recovery Services
- Redis Cache
- Service Bus
- Stream Analytics
- Synapse Workspace
Identity
Management
Messaging
Monitoring
Networking
- Application Gateway
- Bastion
- CDN
- DDoS Protection
- DNS Zones
- Expressroute
- Firewall
- Load Balancer
- Nat Gateway
- Network Interface
- Private Endpoints
- Public Ip
- Route Tables
- Traffic Manager
- Virtual Network
- Vpn Gateway
- WAF Policy
Security
Storage
Web & App
Policies — Well-Architected
Reliability
Security
Cost Optimization
Operational Excellence
Performance Efficiency
Integration