Skip to content

Security: mfbrki/asymmetric-key-generator

SECURITY.md

Security Policy

Purpose

This document outlines the security policy for handling private keys and sensitive data in the asymmetric-key-generator project.

Handling Private Keys

  • Storage: Always store private keys in a secure and encrypted format. Use environment variables or secure vaults for storing sensitive information.
  • Access Control: Limit access to private keys to only those who need it for development or operational purposes.
  • Transmission: Never transmit private keys over unsecured channels. Always use protocols such as HTTPS and SSH for transmission.

Handling Sensitive Data

  • Data Minimization: Only collect data that is necessary for the functioning of the application and its features.
  • Encryption: Encrypt sensitive data at rest and in transit to protect against unauthorized access.
  • Audit Trails: Maintain logs of access and modifications to sensitive data to monitor for unauthorized access.

Reporting Security Issues

If you discover a security vulnerability, please report it directly to the security team using the contact information provided in the repository's contact section.

There aren’t any published security advisories