Secure DevOps environment. Benefits of implementing CyberArk Dynamic Access Provider

The DevOps methodology has been gaining more and more followers, both among big corporations and small IT businesses. By combining strict collaboration of developers and administrators as well as through a wide use of work automation tools, it makes IT teams faster and more effective. However, it has its weak points which affect the security of the whole environment. CyberArk Dynamic Access Provider is a solution which can help.

 

The foundations of DevOps are communication, collaboration and integrations between developers and specialists in the operation of IT systems. This particular methodology accelerates the development of software, products and services. For such efficient collaboration to be possible, it is necessary to automate the IT environment as well as to use multiple tools and cloud-based resources.

 

Physical users and various kinds of tools are part of the process of creating software by following the DevOps methodology. Each day, IT environments use new microservices which communicate with one another as well as with users and administrators by means of special credentials called secrets. The entire authentication process in DevOps takes place automatically and remains outside the control of the security department. This means that unauthorised persons can sneak inside programming tools or hijack the administrator’s account and then infect the code, thereby infecting the entire IT system, explains Krzysztof Andrian, CEO at Concept Data.

 

In other words, though the DevOps methodology enables the implementation of multiple tools that optimise development, testing and deployment of new software, it fails to ensure adequate security of the whole IT environment. It results from, among other reasons, the lack of one location for managing credentials and privileged accounts as well as the inability to use rotation of passwords, keys and tokens, since multiple tools share the same data.

 

CyberArk Dynamic Access Provider

 

CyberArk Dynamic Access Provider is a solution to this problem. DAP was designed for managing security, credentials and access in DevOps environments. The tool supports the administration of secrets used by applications, microservices, Continuous Integration (CI) and Continuous Delivery (CD), APIs etc. It is an additional module – an extension of the standard Core Privileged Access Security module.

 

CyberArk DAP supports:

 

– managing data secrets such as tokens, SSH keys, API keys, certificates
– the use of RBAC (role-based access control) mechanisms
– secure storage and management of secrets combined with the mechanism of automatic rotations based on configurable policies
– centralised audit for all events and operations, including report generation
– full integration with DevOps tools such as Ansible, Chef, Jenkins, and Puppet as well as containerization tools, e.g. Docker, OpenShift etc.

 

How does DAP work? It dynamically collects credentials from a secure location (Vault) only when the given tool, application or system actually needs them.

 

CyberArk’s solution can be easily integrated with the most common DevOps tools and platforms as well as with any systems used by enterprises. Thanks to this approach, organisations can implement and enforce predefined security models and practices. As a result, it enhances security without slowing down developers in their work, emphasises Krzysztof Andrian.

Contact

Our Office

Company’s Registration Address:

 

Concept Data Sp. z o.o. Sp.k.

ul. Piękna 24/26A,
00-549 Warszawa

 

office: +48 22 833 86 35

fax: +48 22 832 17 19

NIP: 701-055-33-94

KRS: 0000603567

Office Address:

 

North Gate Building
ul. Bonifraterska 17,

piętro 4

00-203 Warszawa

 

office: +48 22 833 86 35

fax: +48 22 832 17 19

 

Access to North Gate office
Access to Piękna office

North Gate Building

 

ul. Bonifraterska 17,

00-203 Warszawa

4th floor.

 

Piękna office

 

ul. Piękna 24/26A,
00-549 Warszawa