{"id":641,"date":"2023-05-16T19:53:27","date_gmt":"2023-05-16T19:53:27","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/05\/16\/5-best-practices-for-secrets-management-you-need-to-know\/"},"modified":"2023-05-16T19:53:27","modified_gmt":"2023-05-16T19:53:27","slug":"5-best-practices-for-secrets-management-you-need-to-know","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/05\/16\/5-best-practices-for-secrets-management-you-need-to-know\/","title":{"rendered":"5 Best Practices for Secrets Management You Need to Know"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive alignright wp-image-350428 size-full\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16124840\/5-Best-Practices-for-Effective-Secrets-Management-That-All-Developers-Need-to-Know.jpg\" alt=\"5 Best Practices for Effective Secrets Management That All Developers Need to Know\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16124840\/5-Best-Practices-for-Effective-Secrets-Management-That-All-Developers-Need-to-Know.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16124840\/5-Best-Practices-for-Effective-Secrets-Management-That-All-Developers-Need-to-Know-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16124840\/5-Best-Practices-for-Effective-Secrets-Management-That-All-Developers-Need-to-Know-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>Integrating security initiatives at every stage of the SDLC is gaining momentum. That is, DevOps is fast evolving into a more holistic, security-first process, known as DevSecOps.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The DevSecOps approach has gained momentum recently, but teams have a long way to go when implementing its methods. A recent Ponemon study found that in 29% of organizations, security is integrated at every phase of the software development lifecycle, while at another 40%, security is integrated at some phases.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">One major element that helps ensure security during all stages of development is proper secrets management. Securely storing, managing, and accessing sensitive information (such as passwords, API keys, certificates, and other authentication tokens) is pivotal. This involves using a combination of encryption, access controls, and other security measures to ensure that sensitive information remains secure and is only accessible to authorized machines and personnel.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">In enterprise DevOps and DevSecOps, where developers work with security and other teams in a highly connected and collaborative environment, secrets management plays a crucial role in ensuring the security and integrity of your software throughout the SDLC. It\u2019s pivotal in protecting confidential data from unauthorized access, theft, or misuse. Secrets management also lets you automate tasks like secrets rotation, dynamic injection of credentials into code, and compliance maintenance.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Conversely, ineffective secrets management can lead to serious data breaches that tarnish your company\u2019s reputation and erode customer trust. It can also result in compliance violations which invite legal penalties, fines, or even criminal charges. Not to mention, recovering from a breach is expensive, both in terms of financial costs and the time and resources required to remediate the issue.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">So, as a developer, here are five best practices you must know and incorporate with your DevOps team for airtight secrets management.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">1. Enable JIT Credentials Whenever Possible<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Just-in-Time (JIT) credentials are temporary credentials that are dynamically generated, based on the access requirements of the user or application, and automatically expire after a short period.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">As JIT credentials are short-lived, there is less time for an attacker to exploit them if they are compromised. This reduces the overall attack surface and limits the damage that an attacker can cause.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">In fast-paced DevOps environments where applications and infrastructure are frequently changed, long-lived credentials can create significant security risks. Issuing JIT credentials wherever possible reduces such risk to your systems and resources.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A great way to enable JIT credentials is to use Akeyless for secrets management. The tool allows DevOps teams to easily automate JIT credentials across your infrastructure, setting these secrets to expire as soon as they\u2019re used once, or as soon as a given operation is completed. The platform supports access to ephemeral objects in the CI\/CD pipeline and includes out-of-the-box integrations with all major DevOps tools, ultimately helping you create a fully Zero Trust environment.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">2. Enforce Safe Password Standards<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">This is an obvious yet often overlooked aspect of secrets management because everyone thinks they\u2019re exempt. Reminding teams about using strong passwords is one thing, but setting and enforcing standards for safe passwords is another.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Here are a few ways to do just that:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em; list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\n<li><strong>Create a password policy:<\/strong> Define a password policy that includes minimum length requirements, complexity rules, and expiration periods. Communicate this policy to all your DevOps team members.<\/li>\n<li><strong>Use password managers:<\/strong> Encourage using password managers to generate and store complex passwords. This eliminates the need to remember complex passwords and reduces the risk of password reuse.<\/li>\n<li><strong>Implement multi-factor authentication:<\/strong> Use MFA wherever possible. This provides an additional layer of security by requiring users to provide multiple forms of authentication (such as by phone or email) before gaining access to critical systems.<\/li>\n<li><strong>Monitor and audit:<\/strong> Use automated tools to monitor and audit password-related activities. This helps you detect and respond to security incidents quickly while reducing the risk of human error and ensuring that password standards are consistently enforced.<\/li>\n<\/ul>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Consider encouraging your DevOps lead to bring a cloud-based identity and access management solution such as Okta. It\u2019s a customizable, secure, and drop-in solution to add authentication and authorization services to your applications, enabling all of the above at the organizational level.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">3. Make Sure Your Secrets Are Stored in an Encrypted Environment<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Encryption converts plaintext into ciphertext, which can only be decrypted with a secret key or password. It provides added security from unauthorized access because even if encrypted data falls into the wrong hands, it remains unreadable and unusable without the key.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">If your DevOps team uses Kubernetes for orchestration, it\u2019s important to remember that the platform\u2019s native \u201cSecrets\u201d repository is not encrypted as a default, but rather uses base64 encoding. Moreover, even encrypted vaults can be problematic regarding decryption key governance. This is why enterprise DevOps teams often prefer to use a key management service (KMS).<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A KMS generates, stores, and manages keys and provides them automatically when you need to encrypt or decrypt data. It also enables you to encrypt each dataset or resource with a different encryption key to control access at a more granular level.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">With Encryption as a Service, you can encrypt data in transit and at rest. While many cloud providers offer their own encrypted vault services, these can\u2019t be used in multi-cloud DevOps environments, leading to secrets sprawl and added management workloads. Akeyless, the secrets management platform mentioned earlier, provides KMS and Encryption as a Service \u2014 which means automated encryption, rotation, and tokenization for all keys and credentials with a wide range of protocols \u2014 thus saving time and allowing your team to focus on building without compromising your security posture.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">4. Monitor for Unauthorized Access<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Enterprise DevOps environments comprise many moving parts: tools, teams, workflows, third-party services, etc. So, even when you follow all the best practices above, it\u2019s still possible that a breach or compromise will occur at some point.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">When things go south, and an unauthorized entity gains access, it\u2019s vital to be able to monitor, detect, and respond to the incident as soon as possible to ensure minimum damage \u2014 in terms of system downtime, financial losses, and\/or damage to the company\u2019s reputation.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">For this, a cloud-based endpoint security platform like CrowdStrike greatly helps. It allows DevOps teams to detect and prevent unauthorized access by continuously monitoring all endpoints and alerting you about potential threats in real-time.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">It uses machine learning and behavioral analytics to enable threat intelligence, vulnerability management, rapid incident response, and forensic investigation, thus providing strong protection against unauthorized access for DevOps teams.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">5. Audit Access Permissions Regularly<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Finally, as your DevOps team and its cloud infrastructure evolve over time, it\u2019s important to review who has access to which secrets regularly. This includes both human and machine identities, and the latter can often outnumber the former manyfold.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">With dynamically generated credentials from your secrets management platform, it\u2019s easy to track the various identities that have accessed your vault and see in the session logs when they were approved to retrieve secrets. You get a list of all generated (system administrators, developers, third-party partners, automated services, and so forth) and their access permissions.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Then, by following the principle of least privilege, ensure any unnecessary access permissions are revoked. Timely restriction and separation of access privileges help shrink the attack surface by limiting lateral movement in the event of a breach. Ultimately, such regular audits ensure identities have access restricted precisely to what they need and are authorized for.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Over to You<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Put these five tips into practice to transition from DevOps to DevSecOps and tighten up your organization\u2019s secrets management.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">About the Author<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Tim Ferguson is a tech writer and editor. He enjoys writing about SaaS, AI, machine learning, analytics, and Big Data. He spends his free time researching the most recent technological trends.<\/p>\n<p>\u00a0<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/effective-secrets-management-best-practices\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Integrating security initiatives at every stage of the SDLC is gaining momentum. That is, DevOps is fast evolving into&hellip;<\/p>\n","protected":false},"author":1,"featured_media":642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123,460,592,2],"tags":[],"class_list":["post-641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","category-devsecops","category-secrets-management","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=641"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/642"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}