This Terraform template is supported for the following versions:
| Version | Supported |
|---|---|
| Latest | ✅ |
| < 1.0 | ❌ |
If you discover a security vulnerability in this Terraform template, please follow these steps:
DO NOT open a public GitHub issue for security vulnerabilities.
Instead:
- Email: Send details to the repository maintainers privately
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
For non-security related issues:
- Use the GitHub issue tracker
- Include relevant details about the Terraform configuration
- Specify which Azure services are affected
When using this template:
- Never commit
.tfstatefiles to version control - Use remote state with proper access controls
- Enable state file encryption in your backend
- Never hardcode passwords, keys, or secrets in
.tffiles - Use Azure Key Vault for sensitive data
- Set sensitive variables via environment variables or secure CI/CD
- Mark sensitive variables with
sensitive = true
- Implement least privilege Azure RBAC policies
- Use managed identities when possible
- Regularly review and rotate service principal credentials
- Follow Azure networking best practices
- Implement proper NSG rules and firewall configurations
- Use private endpoints for Azure services when applicable
# Set sensitive variables via environment
export TF_VAR_sql_admin_password="your-secure-password"
# Use Azure CLI authentication (recommended)
az login
# Or use service principal with environment variables
export ARM_CLIENT_ID="your-client-id"
export ARM_CLIENT_SECRET="your-client-secret"
export ARM_SUBSCRIPTION_ID="your-subscription-id"
export ARM_TENANT_ID="your-tenant-id"Security updates and patches will be communicated through:
- GitHub releases
- Repository README updates
- Issue notifications for critical vulnerabilities