Definition
Sensitive Data Exposure occurs when confidential information is inadequately protected, making it accessible to unauthorized parties. This can involve unencrypted data at rest or in transit, exposed API keys, or verbose error messages revealing internal information.How It Works
- 1Data is stored or transmitted without encryption, making it readable to anyone who intercepts it.
- 2API keys and credentials are left in source code repositories, potentially public ones.
- 3Error messages provide too much detail, inadvertently disclosing stack traces or database queries.
- 4Misconfigured cloud storage, such as improperly set permissions on S3 buckets, leaves data open to public access.
Key Characteristics
- Unencrypted data: Sensitive information stored or transferred without encryption.
- Exposed secrets: API keys and credentials in code repositories.
- Verbose error messages: Detailed errors that leak information about the application's internals.
- Misconfigured storage: Cloud storage settings that allow public access to sensitive data.
Comparison
| Feature | Sensitive Data Exposure | Data Breach | Insecure Direct Object Reference (IDOR) |
|---|---|---|---|
| Protection Level | Data not properly protected | Unauthorized access event | Incorrect access control configuration |
| Breach Requirement | No specific breach event required | Often involves an attack | Typically involves user manipulation |
Real-World Example
The Capital One breach in 2019 involved a misconfigured S3 bucket, exposing 106 million customer records, including Social Security numbers and bank account information.Detection & Prevention
- Use tools like truffleHog to scan repositories for exposed secrets.
- Implement strong encryption for data at rest and in transit.
- Regularly audit error messages for excessive information leakage.
- Configure cloud storage permissions to restrict public access.
Common Misconceptions
- 1"Encryption is optional." - Encryption is essential for protecting sensitive data.
- 2"Only large companies are targeted." - Small businesses can also fall victim to data exposure.
- 3"Cloud services are inherently secure." - Misconfigurations can leave cloud storage vulnerable.