Shift Security Left: Streamline Enterprise Secrets Management Workflows

Presented by

Jody Hunt, CyberArk, DevSecOps SME, Dave Meurer, Red Hat, Global Solutions Architect - Security ISVs

About this talk

Automation is a critical part of improving operational efficiency and time-to-market application development teams. But recent supply chain breaches like the SolarWinds attack demonstrated why it’s important to secure, authenticate, and audit access to sensitive data, containers and microservices early in the software development process. Unprotected secrets (credentials, keys, tokens, etc.) embedded within code, automation scripts, etc., could grant attackers access to additional sensitive enterprise and/or customer data and turn a small breach into a disaster. While OpenShift gives you a secure platform for your containers, you will still need to manage secrets amongst containers. CyberArk and Red Hat have teamed up to manage secrets on OpenShift. Development, operations, and security teams need to collaborate and implement efficient security practices from the start to achieve and maintain strong, consistent security postures. By shifting security left, your teams become more efficient and more secure Integrating security into CI/CD pipelines is essential, but it also needs to have minimal application development disruption and integrate into the workflows of sophisticated organizations. In this webinar, you'll learn: Best practices for securing sensitive information in the DevOps/GitOps pipeline using OpenShift The process companies can take to strengthen their security posture How to achieve centralized secrets management with enterprise self-service workflow for application developers
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (118)
Subscribers (7780)
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management. You'll find here live webinars, on demand webinars and videos!