Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HashiCorp Exam Terraform-Associate-003 Topic 6 Question 24 Discussion

Actual exam question for HashiCorp's Terraform-Associate-003 exam
Question #: 24
Topic #: 6
[All Terraform-Associate-003 Questions]

Your security team scanned some Terraform workspaces and found secrets stored in plaintext in state files. How can you protect that data?

Show Suggested Answer Hide Answer
Suggested Answer: B

In Terraform Cloud, speculative plan runs are not automatically started when changes are merged or committed to the version control repository linked to a workspace. Instead, speculative plans are typically triggered as part of proposed changes in merge requests or pull requests to give an indication of what would happen if the changes were applied, without making any real changes to the infrastructure. Actual plan and apply operations in Terraform Cloud workspaces are usually triggered by specific events or configurations defined within the Terraform Cloud workspace settings. Reference = This behavior is part of how Terraform Cloud integrates with version control systems and is documented in Terraform Cloud's usage guidelines and best practices, especially in the context of VCS-driven workflows.


Contribute your Thoughts:

King
7 days ago
I think editing the state file to remove sensitive data is also a good option.
upvoted 0 times
...
Katina
9 days ago
Ah, the age-old question of how to keep our secrets safe. I reckon option D is the way to go - storing the state in an encrypted backend is the most secure approach here.
upvoted 0 times
...
Jose
10 days ago
I agree with Rodney, storing secrets in plaintext is a security risk.
upvoted 0 times
...
Rodney
11 days ago
We should store the state in an encrypted backend to protect the data.
upvoted 0 times
...

Save Cancel