Securing Your Automation Processes to Protect Your Entire Enterprise

Presented by

Joe Garcia, DevOps Security Engineer, CyberArk

About this talk

We all recognize automation can drive dramatic improvements in operational efficiency, but as recent attacks in the software supply chain highlight – automated processes also need to be secure. This session provides tips to improve the security of automation processes running on Red Hat® Ansible® Automation Platform. Gain a better understanding of how open source and enterprise security tools address: - How CyberArk’s secrets manager secures credentials used by Red Hat Ansible, including examples with Ansible collections, to automatically onboard secrets as they are created. - Using Red Hat® Ansible® Tower’s built-in CyberArk secret lookups to remove SSH private keys and root account passwords out of Tower Credentials and Red Hat Ansible playbooks. Learn how to use a “just-in-time” (JIT) approach to give Playbooks access to credentials. You’ll leave this webinar with the tools you need to start strengthening the security of your organization's Red Hat Ansible Automation processes and playbooks. Joe Garcia is a DevOps Security Engineer at CyberArk. He is currently focused on helping customers implement and scale effective secrets management solutions. As CyberArk's subject-matter expert in automation, Joe Garcia shares CyberArk's vision of building a security community that is as agile as the automation they are securing in today's fast-paced environments. This webinar is co-hosted in partnership with CyberArk and Red Hat. As a result, both Red Hat and CyberArk are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see: Red Hat's Privacy Statement: www.redhat.com/en/about/privacy-policy CyberArk's privacy statement: www.cyberark.com/privacy-policy

Related topics:

About this channel

Red Hat ISV
Upcoming talks (1)
On-demand talks (60)
Subscribers (9220)
The Red Hat® Global ISV Program uses modern delivery methods to support a hybrid cloud strategy to help partners build and run applications on any cloud. This strategic, cloud-native development is built on technologies like Red Hat Enterprise Linux® and Red Hat Openshift® and embodies the best practices of continuous integration and deployment (CI/CD) to help you and your customers succeed in the cloud.