Are Your Secrets Out? DevOps And Security Teams Must Collaborate To Reduce Risk Of Cyber Attack

By   ISBuzz Team
Writer , Information Security Buzz | Nov 08, 2017 10:15 am PST

75% Of Organizations Report No Strategy To Manage And Secure DevOps Secrets

 CyberArk (NASDAQ: CYBR), the global leader in privileged account security, today announced that DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several options ranging from PCs / laptops to microservices, cloud environments and containers, nearly all (99%) failed to identify all places where privileged accounts or secrets exist.

The option where the highest levels of unawareness existed was source code repositories such as GitHub, with 84% of survey respondents unaware that privileged accounts or secrets are found here, followed by microservices (80%), cloud environments (78%) and CI/CD tools used by DevOps teams (76%). In reality, privileged accounts and secrets are found in all these entities.

No privileged account security strategy for DevOps

A Gartner survey in mid-2016 found that 50% of enterprises would be using DevOps by the end of 2016[1]. Despite this, further compounding this lack of awareness, 75% of security professionals reported that they had no privileged account security strategy for DevOps, creating significant weak points for attackers to target.

“As organisations employ DevOps, more privileged account credentials and secrets are being created and shared across interconnected business ecosystems,” said Elizabeth Lawler, vice president, DevOps security, CyberArk. “Even though dedicated technology exists, with few organisations managing and securing secrets, they become prime targets for attacks. In the hands of an external attacker or malicious insider, compromised credentials and secrets can allow attackers to take full control of an organisation’s entire IT infrastructure. So it’s worrying that the rush to achieve IT and business advantages through DevOps is outpacing awareness of an expanded – and unmanaged – privileged attack surface.”

Fragmented teams struggling with fragmented security

While many DevOps teams underestimate the volume of secrets being spread across the IT infrastructure, they are aware of the need to improve security. Over a third (37%) of DevOps professionals storing or deploying information in the cloud say compromised DevOps tools and environments represents one of their organisation’s greatest security vulnerabilities – but many are acting alone to tackle the issue.

With just a quarter of security teams reporting that they have a privileged account security strategy for DevOps, and integration between teams lacking for nearly two thirds of respondents (65%), many DevOps professionals are taking matters into their own hands. In fact, nearly a quarter (22%) of them have built their own security solution to protect and manage secrets for DevOps projects.

Lawler continued: “Building your own security solutions is arguably OK up to a point, but is not a scalable way forward. From Jenkins to Puppet to Chef, there are no common standards between different tools, which means you must figure out every single tool to know how to secure it. DevOps really needs its own security stack, and security teams must bring something to the table here. They can provide a systemised approach that helps the DevOps teams maintain security while accelerating application delivery and boosting productivity.”

Cloudy security strategy heightening the risk

Enterprises are increasingly using cloud orchestration and automation tools to drive DevOps initiatives, and nearly half (49%) of respondents reported using the cloud for internal development.

However, the study shows that the lack of a DevOps security strategy extends to the cloud. Nearly two thirds (74%) rely on their cloud vendor’s built-in security, meaning privileged account security is not fully integrated into DevOps processes when spinning up new environments.

Lawler concludes: “Taken together, this year’s survey findings indicate that many organisations do not understand the need – or the mechanisms – to secure privileged account credentials and secrets, whether that’s in the cloud or on-premises. DevOps and security tools and practices must fuse in order to effectively protect privileged information. Building awareness and enabling collaboration between DevOps and security teams is the first step to help businesses build a scalable security platform that is constantly improved as new iterations of tools are developed, tested and released.”

Key Resources and Actions:

  • CyberArk Advanced Threat Landscape 2018 Report (part one): available on request
  • Infographicavailable on request

About the CyberArk Advanced Threat Landscape 2018 report

The CyberArk Advanced Threat Landscape 2018 annual report is the 11th of its kind and will be released in three parts. Part one focuses on how privileged account security is incorporated into DevOps processes. The survey was conducted by Vanson Bourne in September and October 2017 among more than 1,000 IT security decision makers, DevOps and App Developer professionals and line of business owners, across seven countries worldwide.

[1] Gartner, “Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture,” David W. Cearley, Avivah Litan, Mike J. Walker, 21 March 2017 ID: G00319583

Notify of
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

Would love your thoughts, please comment.x