decK security

Uses: decK
Related Documentation
Tags

decK is a CLI tool that runs on your own machine. It can be used to configure RBAC for Kong Gateway Enterprise, but does not provide a way to secure .

decK’s state file can contain sensitive data such as private keys of certificates, credentials, etc. It is up to the user to manage and store the state file in a secure fashion.

Vulnerability disclosure

If you believe that you have found a security vulnerability in decK, submit a detailed report, along with reproducible steps to security@konghq.com.

Did this doc help?

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!