NHI Forum
Read full article here: https://entro.security/blog/entro-custom-secrets-self-serve-detection-rules-across-code-cloud-and-agents/?utm_source=nhimg
Entro has introduced Custom Secrets, a powerful new capability that allows enterprises to define and deploy self-serve secret detection rules across every layer of their environment — from source code and CI/CD pipelines to Slack, Jira, SharePoint, ServiceNow, and cloud workloads. As AI agents and automation expand enterprise footprints, secret sprawl is becoming an invisible but critical risk. Entro’s new feature bridges this detection gap by giving security teams instant control over how and where sensitive data is identified, without vendor intervention or engineering bottlenecks.
In traditional secret scanning tools, organizations often face delays and restrictions when requesting new detector types — limited to a handful of token patterns and usually confined to code repositories. Entro changes this paradigm with a “true self-serve” scanning model, empowering admins to create and enforce custom regex- or phrase-based detectors directly within the console. Within minutes, teams can preview sample matches, validate syntax, and deploy custom detection rules that propagate live across all integrated platforms and environments.
Unlike other static scanners, Entro’s Custom Secrets engine runs continuously across both static and dynamic surfaces — codebases, pipelines, chat systems, collaboration platforms, and machine communication channels (MCP). This ensures that even AI agents, automation workflows, or ephemeral workloads using non-standard tokens are included in enterprise-wide detection coverage.
For instance, teams can build custom patterns such as:
-
A company-specific financial API key format like
finops_svc_[A-Z0-9]{10}_prod. -
An MCP server URI pattern such as
mcp://myagent-runtime.internal.ai:443/api/v1/context, used by internal AI services.
Each finding is automatically enriched by Entro with full contextual metadata — secret owner, workspace, exposure path, and environment — helping analysts triage incidents faster and prioritize critical exposures before they escalate.
Beyond credentials, Custom Secrets also extends to DLP (Data Loss Prevention) use cases. Enterprises can define unique markers for sensitive project names, internal codewords, or compliance-sensitive data such as credit card identifiers or proprietary datasets. These detections can be seamlessly fed into existing DLP, SIEM, or SOAR workflows to automatically quarantine, redact, or trigger playbooks in SOC automation tools like Torq, Tines, and Cortex XSOAR.