Playbook

Secret remediation playbook.

Finding a secret is the beginning. The real security outcome comes from confirming impact, rotating credentials, removing copies and preventing recurrence.

01

Confirm

Validate the finding type, confidence and surrounding context.

02

Identify owner

Find the team, service or system that controls the credential.

03

Assess exposure

Review source, access scope, file history and duplicate locations.

04

Rotate or revoke

Invalidate the exposed secret and issue a managed replacement.

05

Remove copies

Delete or secure files, archives and documents containing the secret.

06

Monitor recurrence

Search for duplicate copies and track whether the same pattern returns.

Checklist

Do not stop at deletion.

Deleting the file does not prove the credential is safe. Rotate or revoke first, then remove copies and review exposure.

  • Confirm secret type and system
  • Determine whether the credential is still valid
  • Rotate or revoke before cleanup when possible
  • Search for duplicates across sources
  • Review access logs for suspicious usage
  • Document remediation status and owner

Start focused

Ready to find where secrets are hiding?

Start with a focused exposure assessment across your highest-risk sources: network shares, repositories, OneDrive or SharePoint.

Request early access