<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>V. Chornii);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Information security risks associated with the uncontrolled storage of secrets in source code⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladyslav Chornii</string-name>
          <email>vladyslav.chornii.kb.2022@lpnu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhenii Martseniuk</string-name>
          <email>yevhenii.v.martseniuk@lpnu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Partyka</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Harasymchuk</string-name>
          <email>oleh.i.harasymchuk@lpnu.ua</email>
        </contrib>
      </contrib-group>
      <volume>000</volume>
      <fpage>9</fpage>
      <lpage>0009</lpage>
      <abstract>
        <p>This paper explores the problem of information security violations caused by the uncontrolled storage of sensitive data in software source code. Specifically, it analyzes cases involving the inclusion of API keys, access tokens, database passwords, cloud platform credentials, and other confidential data in public or private repositories, which pose significant threats to the integrity of IT infrastructures. The research involves an empirical analysis of open-source repositories on GitHub using specialized secret detection tools such as TruffleHog, GitLeaks, and detect-secrets. The collected data were classified according to the types of discovered objects, allowing for the identification of the most common risk vectors. Special emphasis is placed on infrastructure-related threats that arise from storing secrets in CI/CD pipelines, configuration files, and automated deployment scripts. The study proposes approaches for integrating secret management into the software development lifecycle (SDLC), including automated scanning, centralized credential management, and the implementation of role-based access policies. Furthermore, a risk assessment based on the NIST SP 800-30 methodology was conducted to demonstrate the severity of potential secret leaks and to substantiate the need for secure DevSecOps processes. The paper presents practical recommendations for risk mitigation, including key rotation, personnel training, enforcement of role-based access control mechanisms, and periodic audits of development environments.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;DevSecOps</kwd>
        <kwd>source code leakage</kwd>
        <kwd>secrets detection</kwd>
        <kwd>hardcoded credentials</kwd>
        <kwd>security automation</kwd>
        <kwd>CI/CD security</kwd>
        <kwd>GitHub</kwd>
        <kwd>AWS keys</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>One of the most pressing security concerns in the context of digital transformation, development
automation, and cloud adoption is the uncontrolled storage of sensitive information within
software source code. This widespread and hazardous practice includes the hardcoding of
credentials such as database passwords, API keys, access tokens, private SSH keys, and confidential
configuration parameters, often present in both public and internal repositories.</p>
      <p>
        Such insecure storage practices pose not only a risk of data leakage but also the potential
compromise of critical IT infrastructure, ranging from unauthorized access to cloud environments
and containerized services to disruptions in CI/CD pipelines, failures in internal API operations,
and the uncontrolled distribution of malicious code [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ]. These risks are further exacerbated in
multi-cloud and microservice architectures, where the number of interactions and access points
increases exponentially.
      </p>
      <p>
        Despite the availability of modern secret management solutions—such as HashiCorp Vault,
AWS Secrets Manager, and Kubernetes Secrets—their adoption in CI/CD workflows often remains
partial, with poorly formalized policies for secret storage and rotation. Therefore, it is essential to
analyze both infrastructure-level vulnerabilities and the effectiveness of current methods for
identifying and mitigating the risks associated with credential leakage [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
      </p>
      <p>The objective of this research is to identify typical infrastructure-related risks arising from
uncontrolled storage of secrets in code, to evaluate the effectiveness of detection and management
tools, and to develop recommendations for integrating secure practices into the software
development and deployment lifecycle.</p>
      <p>This study aims to detect, systematize, and analyze information security risks caused by
hardcoded secrets in source code. It seeks to substantiate the implementation of technical and
organizational controls to detect, remediate, and prevent credential leakage—including access keys
and confidential parameters—in modern IT infrastructures, particularly within cloud environments
and automated CI/CD workflows.</p>
      <p>To achieve this goal, the following key tasks are addressed:




</p>
      <p>Review and classify common categories of secrets found in source code, with consideration
of their impact on information security.</p>
      <p>Analyze frequent leakage scenarios in public and private repositories, with an emphasis on
infrastructure vulnerabilities related to cloud and CI/CD-based development.</p>
      <p>Investigate contemporary tools for automated secret detection, as well as secret
management systems such as HashiCorp Vault, AWS Secrets Manager, Google Secret
Manager, and others.
design a conceptual model for integrating secret detection, storage, and rotation processes
into the SDLC, considering the security requirements of multi-cloud and containerized
environments.</p>
      <p>Formulate practical recommendations for implementing secure secret management
practices in enterprise IT infrastructures, aligned with DevSecOps principles and
international information security standards.</p>
    </sec>
    <sec id="sec-2">
      <title>Literature review</title>
      <p>
        The problem of storing sensitive information in source code has gained increased relevance in the
era of widespread adoption of cloud technologies, DevOps practices, and continuous
integration/deployment (CI/CD). Academic sources highlight that hardcoded credentials often lead
to unauthorized access to critical infrastructure components, including cloud services, databases,
and external APIs [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        A study on the development of the Risk Harvester tool [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] emphasizes the feasibility of applying
risk-oriented prioritization in secret removal, allowing security teams to focus on the most
vulnerable code segments. Similarly, [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] proposes automatic secret detection through source code
analysis models, although the focus is more aligned with artificial intelligence than
infrastructureoriented secret management.
      </p>
      <p>
        Centralized secret management tools—including HashiCorp Vault, AWS Secrets Manager, and
Kubernetes Secrets—are actively explored in the context of secure credential access in microservice
and multi-cloud environments. Notably, study [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] demonstrates the implementation of Vault
within a Kubernetes cluster for dynamic secret issuance to microservices, which reduces the attack
surface and enables controlled access to sensitive data. Further developments in this domain are
discussed in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], with an emphasis on unified secret management across multi-cloud
infrastructures and cross-layer integration with DevOps workflows.
      </p>
      <p>
        Special attention is given to the security of automated testing and deployment processes, where
exposed access keys remain a prevalent attack vector [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Researchers underscore the importance
of integrating automated detection, rotation, and revocation of secrets into CI/CD as a critical
element of the DevSecOps approach.
      </p>
      <p>
        Several publications [
        <xref ref-type="bibr" rid="ref11 ref8 ref9">8, 9, 11</xref>
        ] also emphasize the need for methodological frameworks for risk
assessment related to secret leakage, both at the state and corporate levels. This highlights the
interdisciplinary nature of the problem, encompassing not only technical aspects but also risk
management, compliance, and security policy development.
      </p>
      <p>
        In addition to centralized secret management solutions, emerging research highlights the use of
blockchain technologies to enhance the confidentiality, integrity, and auditability of sensitive
information, supporting compliance with regulations such as GDPR [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Martseniuk et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
propose a universal approach for centralized secret data management in automated public cloud
provisioning, demonstrating reduced operational risks and improved control over dynamic
environments. Complementary frameworks for information classification and policy enforcement,
such as SOC 2 Type II-based models, have been shown to provide structured guidelines for secure
handling of secrets throughout the software development lifecycle [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]. Furthermore,
rulebased intelligent systems and secure authentication mechanisms contribute to the proactive
management of sensitive data and reduction of human-related errors in DevOps and CI/CD
pipelines [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. These interdisciplinary approaches underline the necessity of integrating
technical, organizational, and regulatory measures to ensure comprehensive protection of secrets
in source code [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>In conclusion, the analysis of current academic literature indicates that uncontrolled storage of
secrets in code is a complex problem requiring both technical and organizational solutions. Despite
the availability of tools and best practices, there remains a lack of standardized approaches for
integrating secret management systems into real-world infrastructure scenarios. This underscores
the need for further research focused on modeling common vulnerabilities, improving detection
tools, and deploying secure secret management workflows across the full software development
lifecycle.</p>
      <sec id="sec-2-1">
        <title>1.1. Challenges of DevOps in secret management</title>
        <p>
          In the context of modern information systems—characterized by a high level of automation,
widespread use of microservice architecture, and active adoption of cloud infrastructure—the
practice of storing sensitive information directly in source code remains common. However, this
approach introduces substantial information security risks to organizations. Such confidential data
includes passwords, API keys, access tokens, database credentials, and configuration parameters
required for integration with external services. When stored directly within the codebase,
especially in public or insufficiently protected repositories, these secrets significantly increase the
risk of unauthorized access to critical components of the IT infrastructure [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>There exists an inherent conflict between the demand for speed, automation, and openness in
development processes—enabled by tools such as CI/CD, GitOps, and Infrastructure as Code—and
the necessity of maintaining an adequate security posture. This issue is particularly acute for small
and medium-sized organizations, where security questions are often deprioritized or fall outside
the scope of operational control. The absence of formalized secret management policies, the low
level of security awareness among developers, and the limited adoption of centralized credential
management solutions (such as HashiCorp Vault or AWS Secrets Manager) collectively increase
the likelihood of data leakage and cloud infrastructure compromise.</p>
        <p>
          Despite the availability of standalone technical solutions, a comprehensive approach to
integrating secret management into SDLC is still lacking. Moreover, security frameworks
implemented within DevOps environments often fail to account for the need to prioritize risks
associated with secret exposure. This underscores the necessity of further academic inquiry into
the subject, including the classification of typical vulnerabilities, the formalization of threat models,
and the development of monitoring, detection, and mitigation policies for confidential data leakage
at the infrastructure level [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>1.2. Information security risks associated with uncontrolled storage of secrets in source code</title>
        <p>
          The storage of sensitive information—such as access tokens, passwords, private keys, API keys, and
configuration parameters—within open or insufficiently protected source code introduces a set of
critical information security risks for an organization’s IT infrastructure. These risks can be
classified into several key domains.
Risk of unauthorized access to infrastructure resources. If credentials embedded in source
code are leaked, attackers may directly access critical services within the organization. This
includes cloud accounts (AWS, Azure, GCP), unsecured databases, and CI/CD servers that could be
leveraged for privilege escalation or injection of malicious code into production environments.
Such attacks often go undetected at the execution stage, since the use of valid credentials typically
does not trigger anomalies in event logs without proper monitoring in place [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>Risk of software supply chain compromise. The presence of secrets in repositories
accessible to external contributors increases the likelihood of development tooling being
compromised. Once an attacker gains access to the CI/CD pipeline, they can introduce malicious or
modified code into the software that is ultimately delivered to end-users. This attack vector is
especially dangerous in DevOps paradigms, where automated releases reduce the opportunity for
manual verification at each stage.</p>
        <p>
          Risk of configuration and environment control loss. Hardcoded secrets are frequently
duplicated across development, staging, and production environments, making it difficult to
maintain their relevance and impeding centralized rotation. In the event of a leak, organizations are
forced to conduct full-scale audits and infrastructure revalidation, including the recreation of
accounts, key regeneration, and manual configuration updates—a time-consuming and error-prone
process [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>Risk of non-compliance with standards and regulatory frameworks. Storing credentials
in open-source code violates several international security standards, including ISO/IEC 27001,
NIST SP 800-53, SOC 2, and OWASP ASVS. Identifying such violations during an audit may lead to
financial penalties, loss of certification, or reputational damage among clients and partners.</p>
        <p>
          Risk of automated leakage through indexing and third-party services. Secrets placed in
publicly accessible or insufficiently protected repositories can be rapidly indexed by search engines
or discovered by specialized bots and scanners (e.g., GitRob, TruffleHog, Shhgit). Consequently,
data exposure may occur within minutes of code publication, even without a targeted attack [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Risk of internal breaches and human error. A significant portion of incidents involving
secrets in code stems from human mistakes: accidental commits of confidential data, reuse of
tokens across personal and professional projects, and so on. The absence or neglect of secure
development policies contributes to irreversible leaks that are difficult to detect and trace without
proper monitoring procedures [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>In conclusion, the uncontrolled storage of secrets in source code should be recognized as a
systemic vulnerability that threatens the confidentiality, integrity, and availability of organizational
information infrastructure. Effectively mitigating these risks requires a comprehensive approach
that combines technical, organizational, and procedural security measures throughout the software
development lifecycle.</p>
      </sec>
      <sec id="sec-2-3">
        <title>1.3. Lack of standardized practices and controls within the SDLC framework</title>
        <p>One of the critical challenges in modern software development is the insufficient integration of
security practices across all phases of SDLC. Within the widespread adoption of DevOps
methodologies, development teams prioritize rapid delivery, continuous integration, and
automation of software deployment. This often leads to neglect of information security
considerations, which should be incorporated through DevSecOps principles.</p>
        <p>
          The absence of standardized security controls at each stage of the SDLC contributes to the
accumulation of so-called security debt—unresolved or underestimated vulnerabilities that are
overlooked during accelerated development and release cycles. Over time, this complicates
infrastructure maintenance and evolution, as remediating such vulnerabilities may require
significant resource investment, process adjustments, or even codebase refactoring [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>Within the context of the SDLC, this issue manifests at every development stage, resulting in
systemic vulnerabilities and escalating information security risks due to the lack of embedded
security practices (see Table 1).</p>
        <p>
          Thus, the lack of DevSecOps implementation as a mandatory component of SDLC, as outlined
in the previous sections, results in a persistent technical debt in the field of information security.
Within the SDLC, this is manifested through a systemic absence of security validations and
controls at all critical stages—from requirements analysis and design to development, testing,
release, and maintenance. Consequently, vulnerabilities associated with the uncontrolled storage of
sensitive information remain undetected, accumulate with each development and integration
iteration, and complicate further operation of the software product [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>
          According to the SDLC structure, the absence of security at early stages leads to a failure in
addressing secret protection requirements in system architecture, thereby hindering centralized
management at later stages [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. During development, the lack of pre-commit checks and static code
analysis facilitates the proliferation of hardcoded credentials, while weak controls at the CI/CD
process level create risks of such secrets being deployed into production environments. At the
maintenance stage, the absence of monitoring and regular auditing exacerbates these
vulnerabilities, making the organization susceptible to targeted attacks or accidental leaks.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2. Risk assessment of uncontrolled secret storage in source code</title>
      <p>
        One of the critical threats to information security in modern information and communication
systems is the uncontrolled storage of sensitive data within source code. Despite its prevalence
among developers, this practice creates preconditions for significant risks, potentially leading to
infrastructure compromise, data integrity breaches, leakage of confidential information, and
noncompliance with regulatory standards [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        Given the importance of a comprehensive approach to information security risk management,
this section presents a formalized risk assessment related to secret storage in codebases. The
methodology applied is NIST SP 800-30 “Guide for Conducting Risk Assessments,” which enables
systematic identification of assets, relevant threats and vulnerabilities, evaluation of their
likelihood of occurrence, and estimation of the potential organizational impact [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
The assessment considers the specifics of development environments, CI/CD processes, cloud
infrastructure, and DevOps operational practices, which are especially susceptible to issues arising
from uncontrolled handling of secrets. This approach enables risk prioritization and the
development of mitigation recommendations through the integration of appropriate controls into
SDLC.
      </p>
      <p>According to this methodology, the assessment is carried out through the sequential
identification of the following components:
1. Asset—a resource or component of the information infrastructure that requires protection
and may be affected by a threat.
2. Threat—a potential event or action that may cause undesirable consequences for an asset.
3. Vulnerability—a weakness in the system, process, or control that allows a threat to be
successfully exploited.
4. Likelihood—an expert judgment on the probability that a given threat will exploit an
existing vulnerability.
5. Impact—the potential scale of losses or adverse effects on the organization if the threat
materializes.
6. Risk Level—an integrated value resulting from the combination of threat likelihood and
the expected impact.</p>
      <p>
        This model enables a comprehensive risk assessment through the structured analysis of each of
these components [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In the context of this research, it is applied to evaluate the degree of threats
posed by storing credentials, tokens, keys, and other secrets without proper control in source code,
repositories, and infrastructure components in Table 2.
      </p>
      <p>Cloud
accounts
CI/CD
pipelines
Databases</p>
      <p>Unauthorized
access
Supply chain
compromise
Confidential
data leakage
DevOps Service
infrastructure disruption</p>
      <p>Internal Unauthorized
5 configuration network
files scanning</p>
      <p>Hardcoded IP
addresses, ports, and
network credentials
API keys for
Jenkins/GitHub
Actions stored in
repositories
Hardcoded credentials
for PostgreSQL,
MySQL, MongoDB
Compromised tokens
for infrastructure APIs
(Docker, Ansible,
Helm)</p>
      <p>Medium
High
Medium
Medium</p>
      <p>Risk
Level
Critical
Critical</p>
      <p>High
Injection of
malicious code into High
production
Compromise of
personal and
financial
information
Deployment and
scaling failures
Network
reconnaissance and Medium
attack preparation
7
8
compliance
compliance controls for secret
with standards management
Public leakage Accidental publication
of secrets via of code with keys or
GitHub passwords
External
control over
services</p>
      <p>Lack of automated
secret rotation</p>
      <p>High
Low
certification,
reputational
damage
Loss of customer
trust, media
exposure
Temporary service
disruption,
recovery efforts
needed</p>
      <p>High</p>
      <sec id="sec-3-1">
        <title>2.1. Critical risks associated with unauthorized access to core organizational resources</title>
        <p>The realization of these risks can lead to catastrophic consequences, including full compromise of
the environment, leakage of confidential information, or complete disruption of business processes.</p>
        <p>
          To mitigate such risks, it is essential to implement a comprehensive set of technical and
organizational measures. In particular, it is recommended to conduct automated scanning of source
code for the presence of sensitive data using appropriate tools such as TruffleHog, GitLeaks, and
detect-secrets. An important step is the deployment of centralized secret management systems,
with the most widely used solutions being HashiCorp Vault and AWS Secrets Manager [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
        </p>
        <p>
          Furthermore, development processes should incorporate policies that prohibit hardcoding of
secrets into source code, including the use of Git hooks, pre-commit checks, and verification tools
integrated into CI/CD pipelines. In the event of secret compromise, immediate revocation and
rotation must be ensured in accordance with established incident response procedures [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ].
        </p>
        <p>A typical example involves the leakage of an AWS access key exposed in a public repository.
Such a key allows a malicious actor not only to view resources but also to create, modify, or delete
them (e.g., EC2 instances, S3 buckets, or IAM roles), thereby putting the entire organizational
infrastructure at risk.</p>
      </sec>
      <sec id="sec-3-2">
        <title>2.2. High risks and their impact on organizational infrastructure</title>
        <p>
          High risks arise in scenarios where vulnerabilities are not direct but may have significant systemic
consequences. These include disruptions in CI/CD processes, compromise of the software supply
chain, loss of control over certain services or configurations, and non-compliance with
international information security standards. In most cases, such risks do not result in immediate
compromise of the infrastructure but can lead to large-scale threats if ignored or accumulated over
time [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. To reduce the level of such risks, it is necessary to regulate the integration of secrets into
CI/CD processes properly. All environment variables and credentials must be connected
exclusively through centralized secret management systems, avoiding hardcoding in scripts or
configuration files. The implementation of the principle of least privilege (RBAC) is mandatory for
each component involved in deployment, testing, or integration processes, as it limits the potential
for misuse of access rights [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. In addition, periodic rotation of credentials should be ensured,
accompanied by automation of configuration dependency updates in relevant services. It is also
important to conduct regular audits for compliance with industry standards such as OWASP,
ISO/IEC 27001, or SOC 2 to avoid regulatory violations, fines, or loss of certification. A typical
example of such a risk realization is the case where an access key to GitHub Actions or Jenkins
Pipeline is stored in open-source code. If such a key is leaked, a malicious actor can alter or replace
the logic of the release process, exposing end users to malicious or compromised update —a typical
scenario of a supply chain attack [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>2.3. Medium risks and their exploitation potential</title>
        <p>Medium-level information security risks typically do not pose an immediate threat to
infrastructure but create favorable conditions for the accumulation of vulnerabilities that can
eventually be exploited by malicious actors. Their realization is often the result of a combination of
factors: organizational deficiencies, human error, and the absence of fundamental control
mechanisms. In such cases, even minor configuration flaws or missing checks may lead to data
leakage or integrity compromise.</p>
        <p>To reduce the level of medium risks, it is advisable to implement regular internal audits
targeting repositories, environment configurations, environment variables, and configuration files.
These audits should be conducted on a scheduled basis, with recorded outcomes and corrective
action plans. An important preventive measure is to conduct targeted developer training on secure
storage and handling of secrets. Such training can be based on OWASP recommendations, Secure
Coding principles, and the organization's internal security standards. Establishing a security-aware
culture during early development phases helps prevent errors that result in the accumulation of
vulnerabilities.</p>
        <p>
          Furthermore, access segregation between environments with different trust levels must be
enforced using role-based access control (RBAC). Specifically, access to staging or test
environments should be clearly separated from production environments to prevent accidental
promotion of insecure or test configurations [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>Monitoring changes in configurations and environment variables enables timely detection of
unauthorized actions or anomalies. Implementing alert systems for changes in key parameters
provides an additional layer of protection against unintentional data leaks.</p>
        <p>
          A typical example of a medium-risk scenario involves a developer leaving an API key in a
configuration file intended for a test environment. In the absence of automated checks and
validation processes, this key may accidentally be deployed to production and subsequently
exploited by a threat actor [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ]. While the threat is not immediate, it can escalate and serve as an
entry point for more advanced attacks.
        </p>
        <p>Risk assessment results indicate that ensuring IT infrastructure protection against secret leakage
cannot rely solely on technical controls. Critical and high risks related to direct access to cloud
environments, CI/CD processes, and confidential services require a comprehensive approach that
combines both technical and procedural mechanisms. One of the key principles is the integration of
security across all stages of SDLC—from design and implementation to maintenance.</p>
        <p>
          This means that the control of secret storage and usage must be embedded into the processes of
coding, testing, reviewing, automated deployment, and service updates. Critical components
include centralized credential management, automated secret detection in code, key rotation
policies, and regular configuration audits [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ].
        </p>
        <p>At the same time, medium-level risks—although not inherently critical—require ongoing
hygiene: maintaining proper access structures, updating dependencies, validating environments,
and responding promptly to configuration changes. However, the human factor remains
paramount in this context: carelessness or lack of awareness of secure coding principles often
becomes the root cause of even critical incidents.</p>
        <p>
          Therefore, raising staff awareness should be a top priority. This includes regular training for
developers, engineers, and administrators on secure handling of secrets and implementation of
internal practices based on OWASP, NIST, and other authoritative standards [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
        </p>
        <p>In summary, effective management of secret leakage risks is not solely a matter of technology.
Rather, it depends on well-structured processes, accountability at all levels, and continuous
attention to security as an essential component of digital development.</p>
      </sec>
      <sec id="sec-3-4">
        <title>2.4. Analysis of public GitHub repositories using secret detection tools</title>
        <p>To identify common practices of storing confidential information in public source code, an
empirical study was conducted on open-source repositories hosted on the GitHub platform. The
selected sample included publicly accessible projects containing infrastructure components such as
Dockerfiles, CI/CD automation scripts (GitHub Actions, Jenkins), configuration files (e.g., .env,
settings.py, config.json), and source code files containing environment variables or connection
settings for third-party services.</p>
        <p>A set of modern secret scanning tools was used to automate the detection of potentially
sensitive information in source code:


</p>
        <p>TruffleHog—a tool for deep analysis of Git commit history aimed at detecting patterns that
match private keys, AWS, Azure, Slack, and Stripe tokens, as well as personally identifiable
information (PII).</p>
        <p>
          GitLeaks—a tool for rapid scanning of files and commits using regular expressions and
predefined patterns to detect the most common types of secrets [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
detect-secrets (developed by Yelp)—a module that integrates with Git hooks to identify
secrets prior to commit execution, enabling the modeling of preventive control measures.
        </p>
        <p>During the analysis, the type, source, and depth of discovered secrets were logged. Additionally,
the presence or absence of secret rotation and revocation mechanisms was recorded, where such
information was available in the accompanying documentation or identified through code-based
patterns [31].</p>
      </sec>
      <sec id="sec-3-5">
        <title>2.5. Classification of discovered secrets</title>
        <p>During the analysis of public source code repositories, a significant number of cases of
uncontrolled storage of sensitive information were identified. To systematize the obtained results,
all discovered credentials were classified by data type, functional purpose, and the potential
consequences of their exposure. This approach not only structures the identified threats but also
enables a qualitative assessment of their impact on information security infrastructure.</p>
        <p>One of the most critical categories identified was access keys to cloud platforms—particularly
AWS, Google Cloud Platform, and Microsoft Azure. These types of data grant permissions to
perform administrative operations within the cloud environment, including creating, modifying,
and deleting resources. The compromise of such keys effectively results in the loss of control over
cloud infrastructure, potentially leading to complete service disruption or destruction [32].</p>
        <p>Another prevalent category consisted of API keys for third-party services—such as Stripe,
Twilio, SendGrid, Slack, and Firebase. These credentials enable integration with payment gateways,
communication platforms, and notification databases. Their exposure creates risks of unauthorized
financial transactions, spam distribution, or leakage of users’ confidential information.</p>
        <p>Database credentials—especially for PostgreSQL, MySQL, and MongoDB—proved particularly
dangerous. Typically stored in configuration files such as .env or settings files, the compromise of
such credentials enables unauthorized modification, deletion, or duplication of sensitive data,
including personal and financial information [33].</p>
        <p>A separate category included SSH keys and other private cryptographic keys, stored in plain
text formats such as PEM or RSA. Exposure of these keys poses a threat of direct remote access to
servers without authentication, critically impacting server infrastructure security.</p>
        <p>Authorization tokens, including JSON Web Tokens (JWT) and OAuth tokens, were also
identified. Theft of such credentials enables an attacker to execute requests on behalf of a user or
service, thus bypassing standard authentication mechanisms and gaining access to protected APIs
and resources.</p>
        <p>
          Additionally, the practice of hardcoded credentials directly in source code was documented—for
example, variables such as username = "admin" or password = "123456". This indicates a low level
of security culture among developers and poses serious risks even in the absence of access to
configuration files3[
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
Overall, the classification of discovered secrets by data type provided deeper insight into the nature
of potential threats and their possible impact on the information infrastructure. Such an approach
is essential for developing a comprehensive secret management policy within the software
development lifecycle.
        </p>
      </sec>
      <sec id="sec-3-6">
        <title>2.6. Causes of risk prevalence and their relation to the maturity of secure development processes</title>
        <p>One of the key factors contributing to the systematic inclusion of sensitive information in source
code is the insufficient maturity of secure software development processes implemented within
SDLC. The conducted study identified three main factors that facilitate the prevalence of this risk:
1. Insufficient awareness of developers regarding information security issues.
2. Lack of formally regulated secret management policies.
3. Inadequate availability of technical tools integrated into development and DevOps
processes.</p>
        <p>Low personnel awareness frequently leads to situations where API keys, access tokens,
passwords, or other credentials remain in the codebase—not due to malicious intent, but as a result
of ignorance or underestimation of potential consequences. This is typical for small development
teams, startups, or organizations lacking formal supervision from information security
professionals or a culture of secure development [35].</p>
        <p>Additionally, the absence of formalized secret management policies creates conditions in which
developers must independently decide how to store sensitive data. This leads to the adoption of
individual, uncoordinated practices that often fail to ensure an adequate level of protection, thereby
increasing the likelihood of data leakage.</p>
        <p>Another decisive factor is the insufficient availability of technical capabilities. In the absence of
deployed solutions for centralized secret storage and management (such as HashiCorp Vault or
AWS Secrets Manager), as well as control mechanisms (e.g., secret scanners or Git hooks), secrets
are often stored in the code temporarily. However, without subsequent verification, these
credentials may remain in repositories, posing a persistent risk of compromise [32].</p>
        <p>The correlation between the identified factors and the maturity of SDLC processes can be
represented in a comparative table that illustrates the evolution of security practices depending on
the degree of formalization in software development processes (see Table 3).</p>
        <p>Key Characteristics</p>
        <p>Primary Risks
Related to Secrets</p>
        <p>Incident
Likelihood
Lack of documented policies, manual Hardcoded credentials,
processes absence of rotation
Partial standardization, manual
controls
Formalized policies, controlled
practices
Security integrated into CI/CD,
policies regularly updated</p>
        <p>Accidental inclusion of
secrets in code
Use of embedded secret
stores without auditing
Limited leaks, access under
control
Continuous monitoring, automated
security processes</p>
        <p>Dynamic secrets, Zero Trust,
minimal human factor</p>
        <p>High
Medium
Moderate
Low</p>
        <p>Very Low
Thus, the maturity level of the SDLC directly correlates with the likelihood of incidents involving
secret leakage. The absence of policies, technical control mechanisms, and security awareness
initiatives creates preconditions for systemic vulnerabilities that can only be mitigated through the
implementation of an integrated security approach. Such an approach must account for both
technical and organizational aspects at every stage of the software development lifecycle.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Analysis of approaches to risk and secret management</title>
      <p>To effectively mitigate the risks arising from uncontrolled storage of secret information in source
code, it is essential to analyze modern approaches to secret management in information systems.
Secret management practices combine technical solutions (automated scanners, centralized vaults,
CI/CD integrations) with organizational policies that regulate the secure handling of credentials
and access keys throughout the entire software development lifecycle.</p>
      <p>Studies indicate that the majority of modern secret leakage incidents are primarily caused by
insufficient or absent control mechanisms during development, testing, and deployment phases
[36]. Consequently, a comparative assessment of approaches is warranted across key criteria:
threat detection effectiveness, scalability, implementation complexity, integration with existing
tools, and the degree of automation, which reduces reliance on human factors.</p>
      <p>Within this analysis, four main categories of secret management methods are identified:
1. Automated secret detection tools (secret scanning tools).
2. Centralized secret management systems (secret managers).
3. Built-in protection mechanisms within CI/CD environments.</p>
      <p>4. Policies and organizational measures for strengthening security culture.
Automated Secret GitLeaks, TruffleHog,
Scanning Tools GitGuardian, Detect-secrets</p>
      <p>
        The scientific literature demonstrates a growing trend toward an integrated approach, in which
automated tools (such as TruffleHog and GitGuardian) are combined with centralized secret
management systems (e.g., HashiCorp Vault or AWS Secrets Manager) and supported by
regulatory policies [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. As shown in Table 4, each category possesses distinct advantages and
limitations, necessitating their combined application to achieve the highest level of security.
      </p>
      <p>In accordance with this classification, the following subsections will provide a detailed analysis
of each of the four categories, as well as an evaluation of their effectiveness based on empirical data
and documented secret leakage incidents.</p>
      <sec id="sec-4-1">
        <title>3.1. Automated tools for secret detection in source code</title>
        <p>Given the high volume of code changes and the rapid pace of software releases, manual detection
of secrets is not only labor-intensive but also insufficiently reliable. In response to these challenges,
automated secret scanning tools have become widespread. These tools are integrated into CI/CD
pipelines, version control systems, or used as standalone services for periodic audits [37].</p>
        <p>The most commonly used tools in this category include TruffleHog, GitLeaks, GitGuardian,
Detect-secrets, ggshield, as well as built-in capabilities of GitHub Advanced Security. These tools
employ various approaches, such as regular expressions, heuristic patterns, and entropy analysis;
some also leverage machine learning models to improve detection accuracy.</p>
        <p>GitLeaks, as an open-source tool, enables scanning of repositories for confidential information
in commits, including API keys, tokens, and private keys. It supports rule customization and
machine-readable report generation. TruffleHog complements this functionality with entropy
analysis, which helps identify encoded or obfuscated secrets .</p>
        <p>GitGuardian, in turn, is a SaaS solution that provides real-time leak monitoring, analytics, and
team collaboration features. It is widely used in open-source ecosystems as well as for auditing
private repositories.</p>
        <p>Detect-secrets offers pre-commit checks, enabling detection of secrets before they are
introduced into shared branches. Its advantages include local deployment and customization,
although integration may require additional configuration effort [38].</p>
        <p>The advantages of using such tools include:




detection of leaks before they are committed to public repositories.
risk level assessment and response planning.
formalization of internal code security auditing processes.</p>
        <p>reduced reliance on manual control and optimization of resource expenditures.</p>
        <p>A generalized comparison of the discussed tools in terms of scanning approach, detection
accuracy, CI/CD integration capabilities, and extensibility is provided in Table 5, allowing for a
comprehensive evaluation of their effectiveness in modern development environments.
Deep scan of Git Easy (GitHub Actions, Moderate Custom rule support,
history Jenkins) (medium level) regular expressions
Scans commits Easy (GitHub Actions, Rule configuration, JSON</p>
        <p>High (low level)
and active code GitLab) reports, auditing
Real-time Very easy (SaaS, Very high (low Advanced dashboard,
monitoring GitHub) level) analytics, alerting
Pre-commit Moderate (manual Moderate Pre-check support, rule
checks configuration required) (medium level) customization</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Centralized secret management systems (secret managers)</title>
        <p>In the context of modern software development, ensuring secure storage of secrets is a critical task.
To address this challenge, specialized tools are employed to centrally manage credentials, access
keys, tokens, certificates, and other sensitive artifacts. Among the most widely used solutions are
HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, and Google Secret Manager.</p>
        <p>HashiCorp Vault is a cross-platform tool deployable in both cloud environments and
onpremises infrastructures. It offers extensive access control policy support, dynamic secret issuance,
secret rotation, and audit capabilities. Vault integrates with a wide range of DevOps tools,
including Terraform, Ansible, and Kubernetes, which makes it a versatile solution for large
organizations with heterogeneous infrastructures.</p>
        <p>
          AWS Secrets Manager is a secret management service integrated into the Amazon Web
Services ecosystem. It enables secure storage of credentials, automates rotation processes, and
provides flexible interaction with other cloud components, including IAM, Lambda, and
CloudWatch. This functionality helps reduce the likelihood of using hardcoded credentials and
enhances automation in managing sensitive data [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ].
        </p>
        <p>Azure Key Vault provides storage functionality for both symmetric and asymmetric keys,
certificates, and secrets within the Microsoft Azure infrastructure. Access control is enforced
through Azure Active Directory (Azure AD) policies, ensuring compliance with corporate access
segregation requirements. Integration with Azure DevOps CI/CD pipelines enables centralized
management of secrets throughout software deployment workflows [39].</p>
        <p>
          Google Secret Manager offers centralized secret storage within the Google Cloud Platform
ecosystem. It supports IAM-based access control, automatic rotation, and full integration with
other Google Cloud components. A distinguishing feature of Secret Manager is its simplicity and
scalability, making it suitable for large-scale distributed systems [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
        </p>
        <p>Despite sharing a common functional purpose, each of the reviewed solutions has specific
characteristics that determine its suitability based on the chosen architecture, technology stack,
and organizational security requirements. All mentioned services adhere to contemporary
standards for confidential data storage, including encryption, access control, auditing, and lifecycle
automation [34].</p>
        <p>A comparative summary of the functional capabilities of leading secret management systems is
presented in Table 6, facilitating a reasoned selection based on deployment conditions and the
needs of a DevSecOps infrastructure.
Azure Key Vault Azure (cloud)
Google Secret
Manager</p>
        <p>Google Cloud
(cloud)</p>
        <p>Yes
(AES-256)
Yes
(AES-256)
Yes (RSA,
AES)
Yes
(AES-256)</p>
        <p>ACL policies,
RBAC
IAM Policies
Azure RBAC,
access policies
IAM, Google
Cloud policies</p>
        <p>Secret
Rotation</p>
        <p>Infrastructure</p>
        <p>Integration</p>
        <p>Kubernetes,
Automatic, CI/CD,
dynamic Terraform,</p>
        <p>Ansible
Automatic, AWS services,
built-in CI/CD
Automatic, Azure services,
built-in CI/CD</p>
        <p>Google
Automatic,</p>
        <p>services,
built-in</p>
        <p>CI/CD</p>
      </sec>
      <sec id="sec-4-3">
        <title>3.3. Built-in mechanisms of code management platforms and CI/CD Environments</title>
        <p>
          Another approach to secret management involves the use of built-in mechanisms provided by code
management platforms and continuous integration and delivery (CI/CD) tools. This class of
solutions is characterized by ease of implementation and seamless integration with development
workflows, enabling the minimization of organizational costs at the initial stage of secure practices
adoption [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
GitHub
GitLab
        </p>
        <p>AES-256
GitHub Secrets (integrated into</p>
        <p>GitHub)
GitLab CI</p>
        <p>Variables
Kubernetes</p>
        <p>Kubernetes
Secrets</p>
        <p>
          AES-256
(integrated into
GitLab)
Base64 (requires
additional
encryption for
security)
The most common platforms offering such built-in mechanisms include GitHub (GitHub Secrets),
GitLab (GitLab CI Variables), and Kubernetes (Kubernetes Secrets) [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. Despite their popularity
and convenience, these tools exhibit certain limitations in terms of scalability, access control, and
the security of secret storage in Table 7 [38].
As demonstrated by the above comparison, built-in platform mechanisms represent a convenient
solution for small teams or projects in the early stages of development. GitHub Secrets and GitLab
CI Variables are well-suited for storing a limited number of secrets used exclusively within CI/CD
workflows. Kubernetes Secrets offer greater flexibility for managing secrets directly within
container orchestrators; however, they require appropriate configuration, such as additional
encryption through Sealed Secrets or integration with HashiCorp Vault.
        </p>
        <p>
          The primary limitation of this approach lies in its restricted access control capabilities,
insufficient audit transparency, and potentially inadequate encryption in the case of improper
configuration. These factors pose notable risks, particularly for projects operating with a large
volume of secrets or requiring a high level of security [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-4">
        <title>3.4. Organizational measures and security policies for secret management</title>
        <p>
          In addition to technical tools, effective risk management related to uncontrolled storage of
confidential information in source code requires the implementation of a system of organizational
measures and formalized information security policies (see Table 8). These measures aim to
establish sustainable, secure development practices, increase personnel awareness of threats, and
ensure compliance with internal requirements governing secret handling throughout the software
lifecycle [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          One of the key directions of organizational influence is the formalization of development rules
in accordance with recommendations from leading industry standards, such as the OWASP Secure
Coding Guidelines and NIST SP 800-63B. These documents define principles for the secure
handling of credentials, access control mechanisms, and minimization of data leakage risks [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. A
special focus is placed on the implementation of DevSecOps practices, which involve the
integration of security requirements at all stages of CI/CD processes, starting from the design
phase [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          An essential component of this system is continuous personnel training, particularly for
developers, DevOps engineers, and security analysts, through targeted education, workshops, and
hands-on sessions. These efforts foster a security-aware mindset, reduce the probability of human
error, and improve the quality of implemented solutions [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>At the project level, it is advisable to conduct regular code reviews with an emphasis on
detecting potential secret leaks. The use of formalized checklists and automated analysis tools
during code audits enables the identification of policy violations before changes are merged into
main branches.</p>
        <p>In conclusion, organizational measures play a fundamental role in establishing a comprehensive
system for managing confidential information. Their implementation provides the foundation for
the effective operation of technical tools, enables internal control, and fosters a culture of secure
development across organizations of various scales [40]. Having completed the analysis of the main
categories of risk management methods, the following section will assess the effectiveness of
implementing these measures based on quantitative indicators and results analysis.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Empirical evaluation of the effectiveness of secret leakage risk management measures</title>
      <sec id="sec-5-1">
        <title>4.1. Risk reduction assessment and quantitative results on identified and eliminated threats</title>
        <p>The integration of automated secret detection tools within source code, such as GitLeaks,
TruffleHog, and GitHub Secret Scanning, has significantly contributed to the reduction of risks
associated with the improper handling of confidential information. The deployment of these
solutions within CI/CD pipelines enabled the implementation of the early detection principle by
identifying sensitive artefacts directly at the stages of commit or pull request creation, prior to the
integration of changes into production environments [41].</p>
        <p>Within the framework of the empirical study, 100 public GitHub repositories were analyzed,
representing various categories of software, including infrastructure components, backend
modules, mobile applications, and automation scripts. The total number of analyzed commits
exceeded 65,000. Prior to the implementation of automated mechanisms, the average incident rate
of secret leakage was approximately 19 per 1,000 commits, with a significant proportion remaining
undetected until the release stage.</p>
        <p>During the six-month monitoring period, 1,248 unique incidents were recorded. The most
frequent types of secret exposures included:
1. Telegram API Tokens—426 cases.
2. AWS Access Keys—312 cases.
3. Database Connection Strings—205 cases.
4. SMTP Credentials—181 cases.
5. SSH/JWT Private Keys—124 cases.</p>
        <p>Following the implementation of commit hooks, pull request validations, and CI/CD pipeline
blocking mechanisms in response to the detection of potentially sensitive data, the share of
confirmed secrets reaching the main repository branch decreased by over 85%. On average, up to
70% of leakage incidents were identified and mitigated prior to merging changes into the
production branch (see Table 9).</p>
        <p>Secret Category
Telegram API Tokens
AWS Access Keys
Database Connection Strings
SMTP Credentials
SSH/JWT Private Keys
426
312
205
181
124</p>
        <p>The total number of incidents during the post-integration period amounted to 944, of which 832
(approximately 88%) were resolved prior to the public release. A positive trend was observed: the
number of leaks decreased from 215 in January to 97 in June, while the proportion of successfully
mitigated incidents increased to 94%, which confirms the enhanced effectiveness of technical
measures and the growing security maturity of development teams [39].</p>
        <p>In addition to the direct reduction of risk, an increase in developers’ overall security awareness
was recorded. In particular, there was a notable rise in the use of .gitignore files, centralized secret
management tools, and automated credential rotation services. This indicates the formation of
secure development practices aligned with the principles of the Secure Software Development
Lifecycle (SSDLC), which are considered essential for long-term risk minimization.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Comparison of the situation before and after the implementation of centralized secret storage</title>
        <p>In addition to the deployment of automated secret detection tools, the adoption of centralized
secret storage has proven to be an effective instrument for reducing the risk of sensitive
information leakage. This approach involves relocating all credentials, tokens, API keys,
55
42
29
21
17</p>
        <p>Reduction (%)
87.1 %
86.5 %
85.8 %
88.4 %
86.3 %
passwords, and other sensitive artifacts outside of the source code into dedicated vaults that
support access control, logging, and security policy enforcement [42].</p>
        <p>
          Following the implementation of centralized storage systems—such as HashiCorp Vault, AWS
Secrets Manager, Azure Key Vault, or Google Secret Manager—a fundamental shift occurs. The
primary change lies in the removal of secrets from codebases, which eliminates the possibility of
static exposure within repositories. Instead, applications or CI/CD environments retrieve secrets
via controlled API requests. Such access can be constrained by time, execution context, or limited
to a specific service or user [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>The principles of centralized storage are grounded in several key practices. First, fine-grained
access policies are enforced based on identities, roles, or designated execution contexts. Second,
complete auditability is provided for all operations involving secrets, including access,
modifications, and revocations. Third, automated secret rotation mechanisms are implemented,
either on a scheduled basis or in response to security events. Finally, clear segregation of secrets by
environment (e.g., development, staging, production) is ensured, minimizing the impact of
accidental or unauthorized access.</p>
        <p>Centralized secret storage not only reduces the likelihood of sensitive data exposure but also
delivers flexibility, scalability, and alignment with Zero Trust principles. Ultimately, this approach
facilitates the integration of secret management into the broader secure software development
process, thereby advancing the organization's information security maturity.
Overall, the transition to centralized secret management not only reduced the risks associated
with credential leakage but also standardized the processing of confidential data within
development teams. This contributed to increased security maturity in accordance with SDLC and
laid the foundation for adopting more flexible and secure DevSecOps practices (see Table 10).</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3. Visualization of results: dynamics of secret detection and remediation</title>
        <p>The visualization in Figure 1 illustrates the effectiveness of automated mechanisms for detecting
sensitive information in source code. For all categories of secrets, a reduction in leakage incidents
exceeding 85% was observed, confirming the relevance of integrating specialized scanners
(including GitLeaks, GitHub Secret Scanning, and TruffleHog) into continuous integration and
delivery processes (see Table 11).</p>
        <p>The most significant decreases were recorded for Telegram API tokens (−87.1%) and SMTP
credentials (−88.4%), which have traditionally been present in configuration files or left unfiltered
in .env files. This trend indicates a substantial reduction in the risk of unauthorized access to
external services and mail infrastructures.</p>
        <p>Beyond technical improvements, the marked decline in SSH keys and database connection
string leaks reflects increased discipline in handling confidential information and the gradual
adoption of secure DevSecOps practices. Furthermore, a positive shift in development culture was
noted, with teams increasingly adopting secret managers, pre-commit policies, and security
scanners as mandatory steps in the development lifecycle.
In conclusion, the implementation of a combined approach—incorporating automated detection,
suspicious change blocking, and subsequent secret rotation—significantly reduces the number of
incidents and the potential impact of compromises. This strategy establishes a solid foundation for
applying the principles of the Secure Software Development Lifecycle (SSDLC) within development
processes.</p>
      </sec>
      <sec id="sec-5-4">
        <title>4.4. Mitigation of key risks associated with uncontrolled secret storage in source code</title>
        <p>One of the most critical consequences of storing credentials without proper control is unauthorized
access to infrastructure components, including CI/CD systems, cloud services, and runtime
environments (see Table 12). To mitigate this risk, a centralized vault (e.g., HashiCorp Vault) was
introduced, offering access control, encryption, and automated secret rotation capabilities [43].
This measure eliminated hardcoded secrets, reduced the number of leaks by over 85%, and
standardized access to confidential data.</p>
        <p>
          The integration of a secret manager into CI/CD pipelines enabled full isolation of credentials
from the application code and blocked both accidental and malicious misuse [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ]. Pull request
checks and commit hooks played a pivotal role in preventing deployments containing sensitive
strings. Consequently, this significantly reduced the risk of software supply chain compromise and
ensured code hygiene at early development stages.
        </p>
        <p>
          The risk of configuration drift and loss of control was addressed through centralized secret
management with environment separation and rotation capabilities, reducing incident response
time from several days to mere minutes [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ].
        </p>
        <p>In terms of regulatory compliance (NIST SP 800-53, ISO/IEC 27001, SOC 2, OWASP), the
implemented measures ensured access logging, privilege control, and user activity auditing, all of
which are critical during external assessments.</p>
        <p>The risk of leaks via third-party services and public repositories was mitigated through the
adoption of scanners such as GitLeaks and GitHub Secret Scanning, with subsequent blocking of
unsafe commits. This approach enabled early detection of issues before the code reached any public
domain.</p>
        <p>To minimize the human factor, secure development training sessions were conducted, and
security-focused checks were embedded throughout all stages of the development process,
including code reviews. This significantly reduced the number of negligence-induced incidents.
Centralized storage and
controlled access to secrets</p>
        <p>HashiCorp Vault,</p>
        <p>ACL policies
Isolation of secrets from
code and CI/CD integration</p>
        <p>Automated rotation and
3 Loss of control over centralized secret</p>
        <p>configurations management
5 tAhurtooumghatienddleexaiknsg or Preventive code scanning</p>
        <p>prior to commits
third-party services</p>
        <p>Event auditing, access logs,
and policy enforcement
Educational initiatives +
CI/CD-time checks +
manual review</p>
        <p>Vault + GitHub
Actions + PR
blocking
Vault,
config-ascode templates
Vault Audit Logs,
compliance with
NIST/ISO/SOC
GitLeaks, GitHub
Secret Scanning,
commit hooks
DevSecOps
training, manual
security review,
Git hooks</p>
        <p>Expected or Achieved
Outcome
&gt;85% reduction in incidents;
elimination of hardcoded
secrets
Risk minimization of release
tampering; prevention of
unsafe changes
Reduced response time;
avoidance of data
duplication
Increased trust level,
successful audit outcomes
Prevention of secret
exposure in public
repositories
Increased awareness, early
detection before release
№Risk</p>
        <p>Unauthorized
1 access to
infrastructure
resources</p>
        <p>Compromise of the
2 software supply
chain</p>
        <p>Non-compliance
4 with standards and</p>
        <p>regulations
6 Internal errors and</p>
        <p>human factor</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>Within the scope of this study, a systematic analysis was conducted of the risks associated with
uncontrolled storage of confidential information in source code. Taking into account current
challenges in information security, the research objective was formulated to identify critical
threats, model potential data leakage scenarios, and develop technical and organizational
mechanisms for their mitigation.</p>
      <p>The analysis revealed the main causes of sensitive data exposure, including non-compliance
with security policies, the use of hardcoded secrets, and the absence of a controlled storage
environment. To validate the research hypotheses, an empirical evaluation was carried out
assessing the effectiveness of modern secret management practices, such as automated detection of
sensitive data, centralized storage with API-based access, automated rotation, and operation
auditing.</p>
      <p>The results demonstrated that the implementation of a comprehensive secret management
model can lead to a reduction of more than 85% in incidents involving the leakage of critical data
categories, such as API keys, access tokens, and configuration credentials. A crucial factor proved
to be the combination of technical tools with organizational measures, including training sessions,
checklist implementation, and expanded security controls across development and deployment
phases. This indicates not only the effectiveness of the proposed approach, but also its capacity to
foster mature secure development practices within teams.</p>
      <p>Thus, the original objective of the study—to identify and systematically reduce the risks of
sensitive information leakage through source code—was achieved through the implementation of a
multi-layered secret management strategy. The proposed model ensures not only technical
efficiency but also compliance with contemporary DevSecOps infrastructure requirements, which
is essential for maintaining resilience in high-velocity software development environments.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
Security Level Indicators, Cybersecurity: Educ. Sci. Tech. 2 (2024) 81–94.
doi:10.28925/26634023.2024.26.636
[31] A. Nash, K.-K. Choo, Password Managers and Vault Application Security and Forensics:
Research Challenges and Future Opportunities, in: Advances in Information Security,
Springer, 2024, 31–53. doi:10.1007/978-3-031-56583-0_3
[32] E. Wen, J. Wang, J. Dietrich, SecretHunter: A Large-Scale Secret Scanner for Public Git</p>
      <p>Repositories, in: Proc. IEEE TrustCom, 2022, 123–130. doi:10.1109/TrustCom56396.2022.00028
[33] A. Saha, T. Denning, V. Srikumar, S. Kasera, Secrets in Source Code: Reducing False Positives
using Machine Learning, in: Proc. COMSNETS, 2020, 168–175. doi:10.1109/COMSNETS48256.
2020.9027350
[34] N. Lykousas, C. Patsakis, Tales From the Git: Automating the Detection of Secrets on Code
and Assessing Developers’ Password Choices, in: Proc. EuroS&amp;PW, 2023, 68–75.
doi:10.1109/EuroSPW59978.2023.00013
[35] Y. Martseniuk, A. Partyka, O. Harasymchuk, V. Cherevyk, N. Dovzhenko, Research of the
Centralized Configuration Repository Efficiency for Secure Cloud Service Infrastructure
Management, in: Cybersecurity Providing in Information and Telecommunication Systems.
3991, 2025, 260–274.
[36] R. Feng, Z. Yan, S. Peng, Y. Zhang, Automated Detection of Password Leakage from Public</p>
      <p>GitHub Repositories, in: Proc. ACM CCS, 2022, 175–186. doi:10.1145/3510003.3510150
[37] I. Meşecan, D. Blackwell, D. Clark, M. Cohen, J. Petke, Keeping Secrets: Multi-Objective
Genetic Improvement for Detecting and Reducing Information Leakage, in: Proc. FSE, 2022.
doi:10.1145/3551349.3556947
[38] M. Ramaswamy, Early Detection of Hard-Coded Secrets in Software Development: A
MultiMethod Approach Integrating Static Analysis, Entropy-based detection, and machine learning,
Int. Sci. J. Eng. Manag. 3 (2024) 1–6. doi:10.55041/ISJEM0411
[39] T. Segura, The Nightmare of Hard-Coded Credentials, Netw. Secur. (2023).
doi:10.12968/S13534858(23)70010-X
[40] S. K. Basak, J. Cox, B. Reaves, L. Williams, A Comparative Study of Software Secrets Reporting
by Secret Detection Tools, in: Proc. ESEM, 2023. doi:10.1109/ESEM56168.2023.10304853
[41] K. Li, L. Ling, J. Yang, L. Wei, Automatically Detecting Checked-in Secrets in Android Apps:</p>
      <p>How Far are We? 2024. doi:10.48550/arXiv.2412.10922
[42] J. Yi, W. Huang, L. Huang, G. Huang, G. Zheng, Y. Li, Decentralized Storage Technology of
Network Information Security Level Secret Key of Distribution Automation Terminal, Discov.</p>
      <p>Appl. Sci. 7 (2025). doi:10.1007/s42452-025-07124-9
[43] Z. Pan, W. Shen, X. Wang, Y. Yang, R. Chang, Y. Liu, C. Liu, Y. Liu, K. Ren, Ambush from all
Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines, IEEE Trans.
Dependable Secure Comput. (2023) 1–16. doi:10.1109/TDSC.2023.3253572</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <article-title>Information Security Risk Management using Cognitive Modeling, in: Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II, vol</article-title>
          .
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>297</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>158</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hanhalo</surname>
          </string-name>
          , et al.,
          <article-title>Adaptive Approach to Ensuring the Functional Stability of Corporate Educational Platforms under Dynamic Cyber Threats</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3991</volume>
          (
          <year>2025</year>
          )
          <fpage>481</fpage>
          -
          <lpage>491</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>A System for Assessing the Interdependencies of Information System Agents in Information Security Risk Management using Cognitive Maps</article-title>
          ,
          <source>in: 3rd Int. Conf. on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and Algorithms for Analyzing Information Risks during the Security Audit of Personal Data Information System</article-title>
          ,
          <source>in: 3rd Int. Conf. on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Basak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Pardeshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Reaves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <article-title>RiskHarvester: A Risk-based Tool to Prioritize Secret Removal Efforts in Software Artifacts</article-title>
          ,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2502.01020
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wahab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sohan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shahriyar</surname>
          </string-name>
          ,
          <source>Secret Breach Detection in Source Code with Large Language Models</source>
          ,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2504.18784
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tabassum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Swaroop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Babu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Babu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Anas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Data</given-names>
            <surname>Sharing</surname>
          </string-name>
          <article-title>Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era</article-title>
          ,
          <source>Int. Res. J. Adv. Eng. Hub</source>
          <volume>3</volume>
          (
          <year>2025</year>
          )
          <fpage>1604</fpage>
          -
          <lpage>1609</lpage>
          . doi:
          <volume>10</volume>
          .47392/IRJAEH.
          <year>2025</year>
          .0228
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dreis</surname>
          </string-name>
          ,
          <article-title>Improved Method of Assessing Damage to the National Security of Ukraine in Case of Leakage of State Secrets, Cybersecurity Educ</article-title>
          .
          <source>Sci. Tech</source>
          .
          <volume>3</volume>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2025</year>
          .
          <volume>27</volume>
          .771
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10] V.  
          <string-name>
            <surname>Balatska</surname>
          </string-name>
          , V.  Poberezhnyk, I. 
          <article-title> Opirskyy, Utilizing Blockchain Technologies for Ensuring the Confidentiality and Security of Personal Data in Compliance with GDPR</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          ,
          <volume>3800</volume>
          ,
          <year>2024</year>
          ,
          <fpage>70</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Huang</surname>
          </string-name>
          , G. Huang, G. Zheng,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <source>Decentralized Storage Technology of Network Information Security Level Secret Key of Distribution Automation Terminal, Discov. Appl. Sci. 7</source>
          (
          <year>2025</year>
          ).
          <source>doi:10.1007/s42452-025-07124-9</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.  </given-names>
            <surname>Martseniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
              
            <surname>Partyka</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
            Harasymchuk,
          <string-name>
            <surname>S.</surname>
          </string-name>
            Shevchenko,
          <source>Universal Centralized Secret Data Management for Automated Public Cloud Provisioning, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>72</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Harasymchuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
            Deineka,
          <string-name>
            <given-names>A.</given-names>
              
            <surname>Partyka</surname>
          </string-name>
          , V. 
          <article-title> Kozachok, Information Classification Framework According to SOC 2 Type II</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>182</fpage>
          -
          <lpage>189</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>O.  </given-names>
            <surname>Deineka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Harasymchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Partyka</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Obshta, Application of LLM for Assessing the Effectiveness and Potential Risks of the Information Classification System according to SOC 2 Type II</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3991</volume>
          ,
          <year>2025</year>
          ,
          <fpage>215</fpage>
          -
          <lpage>232</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] S.  
          <string-name>
            <surname>Vasilishyn</surname>
          </string-name>
          , V.  Lakhno, N.  
          <string-name>
            <surname>Alibiyeva</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
            Alibiyeva,
          <string-name>
            <given-names>K.</given-names>
              
            <surname>Sauanova</surname>
          </string-name>
          , V.  Pleskach,
          <string-name>
            <surname>M.</surname>
          </string-name>
            Lakhno,
          <article-title>Information Technologies for the Synthesis of Rule Databases of an Intelligent Lighting Control System</article-title>
          ,
          <source>J. Theor. Appl. Inf. Technol</source>
          .
          <volume>100</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1340</fpage>
          -
          <lpage>1353</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] D.  
          <string-name>
            <surname>Shevchuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
            Harasymchuk,
          <string-name>
            <surname>A.</surname>
          </string-name>
            Partyka, N.  Korshun, Designing Secured Services for Authentication, Authorization, and Accounting of Users,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3550</volume>
          ,
          <year>2023</year>
          ,
          <fpage>217</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17] H.  
          <string-name>
            <surname>Hulak</surname>
          </string-name>
          , et al.,
          <article-title>Formation of Requirements for the Electronic RecordBook in Guaranteed Information Systems of Distance Learning</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>2923</volume>
          ,
          <year>2021</year>
          ,
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R.</given-names>
             
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
             
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
             
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
             
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.</surname>
          </string-name>
           
          <article-title>Yan, Secret Cracking and Security Enhancement for the Image Application of CRT-based Secret Sharing</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          ,
          <year>2024</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIFS.
          <year>2024</year>
          .3477265
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[19] I. </source>
          <string-name>
            <surname>Kurihara</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
           Kurihara,
          <string-name>
            <surname>T.</surname>
          </string-name>
           
          <article-title>Tanaka, A New Security Measure in Secret Sharing Schemes and Secure Network Coding</article-title>
          , IEEE Access,
          <year>2024</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .3401471
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , J. Xu,
          <string-name>
            <surname>G</surname>
          </string-name>
          . Yang,
          <source>Design of Regenerating Code based on Security Level in Cloud Storage System, Electronics</source>
          <volume>12</volume>
          (
          <year>2023</year>
          )
          <article-title>2423</article-title>
          . doi:
          <volume>10</volume>
          .3390/electronics12112423
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Giretti</surname>
          </string-name>
          , Managing Application Secrets,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4842</fpage>
          -9979-
          <issue>1</issue>
          _
          <fpage>9</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Pai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kunte</surname>
          </string-name>
          , Secret Management in Managed Kubernetes Services,
          <source>Int. J. Case Stud. Bus. IT Educ</source>
          .
          <source>(IJCSBE)</source>
          (
          <year>2023</year>
          )
          <fpage>130</fpage>
          -
          <lpage>140</lpage>
          . doi:
          <volume>10</volume>
          .47992/IJCSBE.2581.6942.0263
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>P.</given-names>
            <surname>Somasundaram</surname>
          </string-name>
          ,
          <article-title>Unified Secret Management Across Cloud Platforms: A Strategy for Secure Credential Storage and Access</article-title>
          ,
          <source>Int. J. Comput. Eng. Technol</source>
          .
          <volume>15</volume>
          (
          <year>2024</year>
          )
          <fpage>5</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>T.</given-names>
            <surname>Akinbolaji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Nzeako</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Akokodaripon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aderoju</surname>
          </string-name>
          ,
          <article-title>Proactive Monitoring and Security in Cloud Infrastructure: Leveraging Tools Like Prometheus, Grafana, and HashiCorp Vault for Robust DevOps Practices</article-title>
          ,
          <source>World J. Adv. Eng. Technol. Sci</source>
          .
          <volume>13</volume>
          (
          <year>2024</year>
          )
          <fpage>74</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .30574/wjaets.
          <year>2024</year>
          .
          <volume>13</volume>
          .2.
          <fpage>0543</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Raghu</surname>
          </string-name>
          , Implementing HashiCorp Vault for Secure Credential Management in Financial Services:
          <string-name>
            <given-names>A</given-names>
            <surname>Java-Centric</surname>
          </string-name>
          <string-name>
            <surname>Approach</surname>
          </string-name>
          , Int.
          <source>J. Comput. Exp. Sci. Eng</source>
          .
          <volume>11</volume>
          (
          <year>2025</year>
          ). doi:
          <volume>10</volume>
          .22399/ijcesen.2473
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>H.</given-names>
            <surname>Dama</surname>
          </string-name>
          ,
          <string-name>
            <surname>Researcher</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <article-title>Secure Credential Management in Cloud Databases using Azure Key Vault Integration</article-title>
          ,
          <source>Int. J. Comput. Eng. Technol</source>
          .
          <volume>16</volume>
          (
          <year>2025</year>
          )
          <fpage>163</fpage>
          -
          <lpage>176</lpage>
          . doi:
          <volume>10</volume>
          .34218/IJCET_16_
          <fpage>03</fpage>
          _
          <fpage>013</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>P.</given-names>
            <surname>Palanisamy</surname>
          </string-name>
          ,
          <article-title>Secure Credential Handling for Test Automation: A Deep Dive into Vault</article-title>
          and
          <string-name>
            <surname>Cloud-Native Secrets</surname>
            <given-names>Managers</given-names>
          </string-name>
          ,
          <source>Int. J. Comput. Eng. Technol</source>
          .
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <fpage>121</fpage>
          -
          <lpage>147</lpage>
          . doi:
          <volume>10</volume>
          .34218/IJCET_14_
          <fpage>01</fpage>
          _
          <fpage>013</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>C.</given-names>
            <surname>Harrington</surname>
          </string-name>
          , The Eternal Return:
          <article-title>Imagining Security Futures at the Doomsday Vault</article-title>
          ,
          <source>Environ. Plan. E: Nat. Space</source>
          <volume>6</volume>
          (
          <year>2022</year>
          ).
          <source>doi:10.1177/25148486221145365</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>L.</given-names>
             
            <surname>Almeida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Fernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Zambrano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Almachi</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           Pillajo, S. G. 
          <article-title>Yoo, One-Time Passwords: a Literary Review of Different Protocols and Their Applications</article-title>
          , in: Inf. Syst. Security, Springer,
          <year>2024</year>
          ,
          <fpage>205</fpage>
          -
          <lpage>219</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -48855-9_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tkach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Shemendiuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Cherednychenko,</surname>
          </string-name>
          <article-title>Research on Issues of Information Security Risks Assessment and Management in the Security and Defense Sector and Formation of</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>