Open rmclaughlin-nelnet opened 2 years ago
@rmclaughlin-nelnet Can you help us understand the following
For #1 Current values are inherently not-synced to Postman servers - you can use these and even leave Initial values empty. Also when you say "All other users", are these users in your own org, or is this like a Public collection?
Our org has government regulations (PCI, FFIEC, etc) that we have to follow and postman is currently not authorized to store our secrets, if an accident happens we have to go through a change process, so it is very important that secrets do not make their way onto postman servers. With the current feature set this is hard to enforce because postman makes it so easy to make a mistake (accidentally put something in initial value, or click the persist all button, or even hard coding a secret in a request).
We are doing training to mitigate this, but some help, features to prevent this, from the postman team would be much appreciated.
Hey @rmclaughlin-nelnet,
With V11 of Postman, we have introduced the Postman Vault (https://learning.postman.com/docs/sending-requests/postman-vault/postman-vault-secrets/), which allows you to store your sensitive data in an encrypted local vault that is not synced with the Postman Cloud. Also, we have added multiple security features to help prevent accidental exposure of your API credentials.
Is there an existing request for this feature?
Is your feature request related to a problem?
Postman is a great product but there are several security issues that make it challenging to use and keep secure.
Describe the solution you'd like
Allow disabling the sync of initial values. This needs to be at the team or collection level so that each user does not have to do it on their own.
Describe alternatives you've considered
Putting place holder text in the initial value
Additional context
No response