decK security

Uses: decK
Related Documentation
Tags

decK is a CLI tool that runs on your own machine. It can be used to configure RBAC for Kong Gateway Enterprise, but does not provide a way to secure .

decK’s state file can contain sensitive data such as private keys of certificates, credentials, etc. It is up to the user to manage and store the state file in a secure fashion.

Vulnerability disclosure

If you believe that you have found a security vulnerability in decK, submit a detailed report, along with reproducible steps to security@konghq.com.

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!