Secret

A secret at cyber security means any confidential information used to authenticate, authorise or secure access to systems, data or services. If compromised, it poses a direct security risk, which may result in unauthorised access, data leakage or operational disruption.

 


Common examples

 

  • 🔑 Passwords and secret phrases (passphrasespassphrases in English)
  • 🔐 Cryptographic keys (private or symmetrical)
  • 🪪 Access tokens (API tokensOAuth tokens)
  • 📇 Digital certificates and SSH keys
  • 🔏 Keys to encryption databases

 


Features

 

  1. Confidentiality Must never be displayed in clear view.
  2. Integrity Must be protected against unauthorised modification.
  3. Traceability Access must be logged and controlled.
  4. Lifecycle Regular rotation and revocation if compromised.

 


Best practice

 

  • ✅ Use safes of secrets (Hashicorp Vault, AWS Secrets Manager, Azure Key Vault).
  • Never unencrypted storage in code, configuration files or emails.
  • ✅ Apply the principle of the least privilege for access.
  • ✅ Implementing a automatic rotation (e.g. every 90 days)

Associated risks

 

  • � Leak due to human error (accidental commit in a public depot)
  • ⚠️ Brute-force attacks or social engineering
  • ⛔ Use of default or weak secrets

 


Reference standards

 

Towards the ORSYS Cyber Academy: a free space dedicated to cybersecurity