The Radius logs show a query that should never have run. Buried in the output is sensitive data—credentials, tokens, PII—now exposed.
Radius sensitive data is not theoretical. It lives in authentication requests, accounting messages, and access-accept packets. These values can include usernames, passwords, session identifiers, and device information. In raw form, this data often travels through RADIUS servers, proxies, and NAS devices. Without controls, it’s visible to operators, attackers, and logging systems.
Protecting Radius sensitive data starts with strict encryption. Use strong TLS for RadSec. Disable older protocols like PAP unless absolutely required. Limit attribute logging to the minimum fields needed for troubleshooting. Hash or mask values before storage. Monitor outbound logs for leaked attributes.
Misconfigurations are a common cause of exposure. Shared secrets in plain text. Debug mode left on in production. Unsegmented network paths between NAS and RADIUS servers. These open doors to interception or leaks. Review RADIUS server configs often. Rotate keys. Apply network ACLs that only allow known clients.