MEDIUM
Source
CloudSploit
ID
secret-expiration-enabled

Secret Expiration Enabled

Ensures that all secrets in Azure Key Vault have an expiry time set.

Setting an expiry time on all secrets forces secret rotation and removes unused and forgotten secrets from being used.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the Microsoft Azure Management Console.

  2. In the search bar at the top search for Vaults and select “Key Vaults” from the search result. Step

  3. In the Key Vaults page, select a key vault by clicking on the “Name” link to access the configuration changes.Step

  4. Scroll down and click “Secrets” from the navigation pane on the left. Step

  5. Then, from the list of secrets, select a secret with no expiration date under “Expiration date” column.Step

  6. In the secret versions pane that opens, select the currently “Enabled” version by clicking on it.Step

  7. In the secret version pane, if the “Set expiration date” checkbox is not selected, then expiration is not set for this secret. This is a security vulnerability.Step

  8. Select the “Set expiration date” checkbox to enable expiration.Step

  9. Now click on the calendar for “Expiration date” and select a date after 27 days to set as expiration date.Step

  10. Finally, hit “Save” at the top of the pane to complete the changes.Step

  11. Repeat step number 3 - 10 for all other key vaults and keys without expiration date.