Environment variables are not all equal. Some are used for database passwords and others are used for things like enabling dark mode - both are important but not the same in terms of sensitivity.
Today, we’re excited to launch Netlify Secrets Controller! This feature set is designed to help you proactively protect and manage environment variable values as secrets.
While all environment variables are encrypted in our database and securely transferred, Secrets Controller goes further to protect your most sensitive environment variables. With Secrets Controller, you can explicitly mark which environment variables contain secret values. After doing so, Netlify enforces a strict policy on how those values can be accessed and features that can use them. The gist is, only your code running on Netlify’s systems will have access to the raw, unmasked values - everywhere else will only have access to unreadable, masked values.
We didn’t stop there! With Secrets Controller, you automatically get secrets scanning during your Netlify build process! This is a massive win for proactively protecting your secrets!
With secrets scanning, Netlify searches the code imported from your repo AND your build output to find any secrets that might have been accidentally committed or injected directly into your build artifacts. The sophisticated scanner will look for different permutations of these values - including scanning for multi-line values! If it finds any secrets, it will fail the build and alert the developer to the location of the secrets - preventing these values from being exposed publicly or accessible to members of your Netlify team.
Exposing secrets only takes 1 line of code in so many cases. With this, it’s incredibly important to ensure you’re catching these issues and keeping your business and end-users safe.
Secrets Controller is a big win for defense-in-depth and keeping your business and users safe.
Start using it today! Visit your site/team’s environment variables page and mark the variables that contain secrets. That’s it! You can also use the CLI or API to mark which environment variables contain secrets.
Secrets Controller is available for our Enterprise and Open Source Plans