ShiftLeft released a new version of NextGen Static Analysis (NG SAST), including new workflows, purpose-built for developers that significantly improve security, while enhancing productivity.
CyberArk announced the integration of the CyberArk Conjur secrets management solution with Ansible.
The CyberArk Conjur integration with Ansible empowers DevOps and security teams with security tools to automatically manage and better secure secrets used by Ansible. The joint solution helps automate and audit security and management tasks related to secrets used by Ansible. CyberArk Conjur provides for secrets used by Ansible to be authenticated, authorized and audited without interfering with workflows familiar to Ansible users.
“DevOps and the automated software delivery pipeline utilize multiple tools that require powerful secrets, which if compromised, will result in costly compromises and a vulnerable pipeline of products,” said Justin Nemmers, GM, Ansible, Red Hat. “The integration with CyberArk Conjur gives DevOps teams the ability to better secure secrets used by Ansible, which reduces the attack surface while supporting the automated delivery of reliable, high quality applications in any environment.”
The CyberArk Conjur solution is a secrets management solution that is tailored specifically for the requirements of native cloud and DevOps environments. The solution helps organizations secure and manage secrets used by machines, such as microservices, applications, scripts, hosts, and CI/CD and configuration management tools, as well as control access and monitor activities of privileged users throughout the DevOps pipeline.
“Adopting DevOps workflows and driving successful outcomes for the development and release of high quality, secure applications requires organizations to strategically plan ahead for the increased demands of high velocity deployment environments,” said Adam Bosnian, EVP, Global BD, CyberArk. “The integration with Ansible embeds and automates privileged account security into DevOps pipelines, making it easier for organizations to protect secrets and mitigate security risks while maintaining speed.”