
OWASP CI/CD Part 6: Insufficient Credential Hygiene
Part 1
Insufficient Flow Control Mechanisms
Part 2
Inadequate Identity & Access Management (IAM)
Part 3
Dependency Chain Abuse
Part 4
Poisoned Pipeline Execution (PPE)
Part 5
Insufficient Pipeline-Based Access Controls (PBAC)
Part 6
Insufficient Credential Hygiene
This post, part six of our OWASP CI/CD Top 10 series, looks at some of the common risks associated with Insufficient Credential Hygiene. By better understanding the flaws that affect credential hygiene, we can better