The DevOpportunity: Prioritizing Security
May 02, 2018

John Walsh
CyberArk

It wasn't long ago when operations, development and security teams didn't talk to each other – and probably sat at different lunch tables in the cafeteria.

Fortunately, when it comes to operations and development, DevOps has changed the traditional compartmentalized style of development by eliminating silos. These teams recognize that operational considerations need to be factored into development decisions from the very beginning, and vice versa to achieve optimal performance.

But what about the security team? Security is largely still siloed from operations and development. No doubt, many DevOps teams have some security controls baked into their automation processes, but a recent survey shows there are still alarming gaps.

Survey Says: The Secret is Out

According to the 2018 CyberArk Global Advanced Threat Landscape report, fewer than half of DevOps survey respondents said DevOps and security teams are well integrated and 41 percent say security teams are only brought in at the end of the development cycle. It's hard to defend the notion that security is built into the DevOps process when most organizations admit that DevOps and security teams are not well integrated.

And while development and operations teams can be expected to be knowledgeable about security to a certain point, it is unreasonable to expect them to have the level of security expertise that security teams have acquired through years of experience. The lack of maturity when it comes to DevOps security is made apparent throughout the report.

Many DevOps teams run automatic vulnerability scans or take other measures to eliminate the low hanging security fruit. This is a great first step, but 75 percent of organizations reported they have no privileged account security strategy for DevOps. Even worse, 99 percent of respondents failed to identify the different places privileged accounts or secrets could exist in a DevOps environment.

Privileged accounts, secrets and credentials equal access to an organization's data and infrastructure. With this access, an attacker can impersonate anyone within the organization and take almost anything they want.

Infrastructure-as-code is the engine that fuels DevOps velocity. However, it also means that everything a DevOps team has done, institutional know-how and intellectual property can be more easily stolen.

Making the Case for DevOps Security

Attackers will exploit organizations where they are weak, making unsecured and unmanaged "secrets" – including privileged account credentials, SSH Keys, API keys and more – a new favorite target for attackers.

These secrets are often hardcoded in clear text or publicly accessible, making DevOps a massive security risk to organizations. Attackers know this and are currently exploiting these vulnerabilities and scanning for exposed SSH keys across the internet.

Bottom line – DevOps has changed the game in terms of productivity, but security needs to be a part of the journey. The move from waterfall to agile development has taught us the most efficient time to make a change is at the beginning of the process, which is true of security too.

Security teams need to be included in the DevOps process from the beginning to reduce the cost of changes made later on. Security tools have evolved over time to meet DevOps security teams and not to disrupt DevOps flow or velocity. Any credible security solution will need the ability to be automated and have a small, if not invisible, footprint on DevOps teams.

John Walsh is a Tech Evangelist at CyberArk
Share this

Industry News

June 25, 2024

JFrog has entered into a definitive agreement to acquire Qwak AI Ltd., creator of an AI and MLOps platform.

June 25, 2024

OutSystems announced that OutSystems Developer Cloud (ODC) has achieved SOC 2 attestation, a requirement of organizations deploying mission-critical systems and applications that manage sensitive personal data.

June 25, 2024

Bitwarden announced public beta availability for integrating Bitwarden Secrets Manager into Kubernetes workflows for developers and DevOps teams.

June 25, 2024

GitLab achieved “In Process” designation at the Moderate impact level from the Federal Risk and Authorization Management Program (FedRAMP).

June 24, 2024

Grid Dynamics announced its AI for Developer Productivity Toolkit.

June 24, 2024

Multiplayer, a collaborative developer platform for teams who work on distributed software, officially announced its General Availability.

June 24, 2024

DataStax announced major updates to its Generative AI development platform that help make retrieval augmented generation (RAG) powered application development 100X faster.

June 24, 2024

Kobiton announced that its mobile app testing platform now supports the beta version of iOS 18.

June 20, 2024

Oracle announced new application development capabilities to enable developers to rapidly build and deploy applications on Oracle Cloud Infrastructure (OCI).

June 20, 2024

SUSE® announced new capabilities across its Linux, cloud native, and edge portfolio of enterprise infrastructure solutions to help unlock the infinite potential of open source in enterprises.

June 20, 2024

Redgate Software announced the acquisition of DB-Engines, an independent source of objective data in the database management systems market.

June 18, 2024

Parasoft has achieved "Awardable" status through the Chief Digital and Artificial Intelligence Office's (CDAO) Tradewinds Solutions Marketplace.

June 18, 2024

SmartBear launched two innovations that fundamentally change how both API and functional tests are performed, integrating SmartBear HaloAI, trusted AI-driven technology, and marking a significant step forward in the company's AI strategy.

June 18, 2024

Datadog announced the general availability of Datadog App Builder, a low-code development tool that helps teams rapidly create self-service applications and integrate them securely into their monitoring stacks.

June 17, 2024

Netlify announced a new Adobe Experience Manager integration to ease the transition from legacy web architecture to composable architecture.