SlideShare a Scribd company logo
1 of 32
Puppet presents “Talking Tech”
A new webinar series featuring exciting technology solutions
that are driving the industry forward
Delivering Infrastructure and Security Policy as Code with Puppet and CyberArk Conjur
Date: Wednesday, 8 November 2017
Manage F5 BIG-IP Infrastructure with Puppet
Date: Tuesday, 14 November
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOps
Date: Wednesday, 15 November
Delivering Infrastructure and
Security Policy as Code
Presenters
Jeff Schmied
Director
Information Technology
Puppet
Ryan Prior
Software Engineer
@ryanprior
CyberArk
Talking Tech: Puppet Webinar Series
Automating Rapid Delivery, Securely
Infrastructure-as-Code
IT infrastructure managed and
provisioned through code, rather than
manual processes
Security-as-Code
Automating security policy enforcement
through code, rather than manual
processes
Talking Tech: Puppet Webinar Series
Agenda
• Enterprise Information Security Perspective
• Overview of CyberArk Conjur
• Overview of Puppet and DevOps
• Security Challenges in DevOps Toolchain
• Leading Practices
• Example Code
• Q&A
Talking Tech: Puppet Webinar Series
Privileged access management
Data security in the cloud
Social engineering
Ransomware
Vulnerability management
Bring Your Own Device
Nation-state cyber attacks
Shadow IT
Internet of Things
What do I wake up worrying about?
Talking Tech: Puppet Webinar Series
Talking Tech: Puppet Webinar Series
Database containing driver PII was compromised after storing keys in a
publicly available repository (May 2014)
XcodeGhost hack uses compiler backdoor to inject 3rd party code into
developed applications (September 2015)
Hacker accessed a Docker registry that contained the entire Vine source
code, API keys, and other secrets (July 2016)
Hackers have exploited known MongoDB vulnerabilities to plant
ransomware into high-profile clients such as Emory Healthcare (January
2017)
Exploits are targeting the application development tool stack
Manually copied SSH keys to servers to provide
access?
Shared a key over chat?
Manually configured or changed production servers?
Stored secrets in config files in S3?
Stored secrets in source control?
Embedded passwords in applications?
Confession time... Haven’t we all, at least once...
Talking Tech: Puppet Webinar Series
Your secrets and privileged accounts are the keys to your
business.
Every piece of infrastructure you operate uses secrets.
CyberArk provides the tools and know-how to manage all your
secrets, giving you total visibility and control.
CyberArk is Proactive Security
Talking Tech: Puppet Webinar Series
Using a common language
Across everything, no matter where it runs
Puppet provides an automatic way to:
know what you have control it and enforce
consistency
secure it and keep it
compliant
modernize it
to the new wayfrom the old way
DevOps Represents A Massive Shift
Automatic, standard and scalable
Delivering at will
Inherent security
Constantly modern
Ad hoc, manual and error prone
Infrequent delivery
Security in silos
Legacy platforms
Traditional view of security:
A bunch of suits preventing my killer app
from going to prod
Perspectives Matter
An essential view of security:
A thing that helps prevent the destruction
of my employer, my job, my information
Talking Tech: Puppet Webinar Series
Securing secrets has evolved since Puppet’s early days
Human Identity
Degree of
Security
Less
More
Hiera-Eyaml
- secrets abstracted
and encrypted
Conjur Secrets Store
- secrets secured
- key rotation
Puppet Manifests
- secrets exposed in
code
Time (& Scale!)
Talking Tech: Puppet Webinar Series
Some Good Practices
• Encrypt secrets
• Rotate secrets
• Make secrets ephemeral
• Authenticate all requests (Zero Trust)
• Authorize minimally (Least Privilege)
• Audit everything
• Automate all of the above
Talking Tech: Puppet Webinar Series
Some Better Practices (Enlightened State)
▪ Workflows that support velocity and enhance security at the same time
▪ Security configuration is part of the development flow - i.e. in the same
code repos as the applications - otherwise security and code get out of sync
and deploys fail
▪ Security tools run separately from developer tools – to isolate secrets
management from application code
Talking Tech: Puppet Webinar Series
Example CI Workflow w/ GitHub, Jenkins & Docker
SECRETS
REQUIRED!
SECRETS
REQUIRED!
SECRETS
REQUIRED!
SECRETS
REQUIRED!
Talking Tech: Puppet Webinar Series
How do these ideas apply to Puppet?
Puppet
Master
Secret
Store
Staging
App 1
App 2
App 3
Production
App 1
App 2
App 3
Talking Tech: Puppet Webinar Series
The Solution
+
Human Identity
Talking Tech: Puppet Webinar Series
Build on a chain of trust
Authenticate all requests
Authorize w/ least amount of privilege
Audit everything
...and do it with code!
Identity leads to effective access management
Talking Tech: Puppet Webinar Series
Machine Identity with Conjur
PUPPET
MASTER
Puppet Admin
Node Node
Configuration
Puppet
Agent
Puppet
Agent
Node
Puppet
Agent
TEAM 1 TEAM NTEAM 2
Node obtains a
Conjur access
token, encrypts it,
and places it in the
“facts”
• The Puppet master uses a Node’s
identity to fetch secrets via the
Conjur module.
• A Node’s access to Secrets is
defined in declarative Policies
CyberArk-Conjur
Conjur Module
Talking Tech: Puppet Webinar Series
Secure Workflow w/ Machine Identity
Talking Tech: Puppet Webinar Series
Puppet Manifest with Secrets
################## Site.pp ##################
node 'default' {
require secrets
file { '/tmp/dbpass':
ensure => file,
content => "${secrets::postgres_password.unwrap}",
show_diff => false, # don't log file content
}
file { '/tmp/token':
ensure => file,
content => "${secrets::vendor_oauth_token.unwrap}",
show_diff => false,
}
}
################## Secrets.pp ##################
class secrets {
$vendor_oauth_token = Sensitive('5262e7a7-4cfd')
$postgres_password = Sensitive('wake operator pure')
}
Talking Tech: Puppet Webinar Series
Heira with Secrets
################## Site.pp ##################
node 'default' {
file { '/tmp/dbpass':
ensure => file,
content => "${hiera(‘postgres_password’)}",
show_diff => false, # don't log file content
}
file { '/tmp/token':
ensure => file,
content => "${hiera(‘vendor_oauth_token’)}",
show_diff => false,
}
}
# oauth token
$ eyaml encrypt '5262e7a7-4cfd'
# database password
$ eyaml encrypt 'wake operator pure'
# instructions:
# load these into Hiera, distribute keys to operators
Talking Tech: Puppet Webinar Series
Puppet Manifests using Conjur
################## Site.pp ##################
node 'default' {
require secrets
file { '/tmp/dbpass':
ensure => file,
content => "${secrets::postgres_password.unwrap}",
show_diff => false, # don't log file content
}
file { '/tmp/token':
ensure => file,
content => "${secrets::vendor_oauth_token.unwrap}",
show_diff => false,
}
}
################## Secrets.pp ##################
class { 'conjur':
account => 'demo',
appliance_url => 'http://conjur',
authn_login => "host/app-${::trusted['hostname']}",
host_factory_token => Sensitive('placeholder-for-HF-token'),
version => 5,
}
class secrets {
$vendor_oauth_token = conjur::secret('app/vendor-oauth-token')
$postgres_password = conjur::secret('app/postgres-password')
}
Talking Tech: Puppet Webinar Series
Conjur Policy that Controls Secrets Access
- !policy
id: app
annotations:
description: Conjur Puppet demo app policy
body:
# Roles
- !layer app
- !host-factory
annotations:
description: factory for new app node identities
layers: [ !layer app ]
# Secrets
- !variable
id: vendor-oauth-token
annotations:
description: authenticate vendor access to service endpoint
- !variable
id: postgres-password
annotations:
description: login credential for app database
# Entitlements
- !group users
- !permit
role: !group users
privileges: [ read, execute ]
resources: [ !variable vendor-oauth-token, !variable postgres-
password ]
- !grant
role: !group users
members:
- !layer app
Talking Tech: Puppet Webinar Series
Tradeoffs to using identity to retrieve secrets...
▪ Pros:
• Eliminates over-privileged central attack target
• Enables fine grained control of secret retrieval & updating
• Secrets are dynamically retrieved without writing a lot of code
• Enables teams to self manage their application secrets (ex. staging)
• All access is authenticated, authorized and audited (makes Security happy)
▪ Cons:
Requires a one-time manifest change
Talking Tech: Puppet Webinar Series
Lessons We’ve Learned
• It is possible to align Velocity and Security
• If security is a bad UX, everybody loses
• Established Security principles still apply, but must acknowledge new realities
• Security policies should declaratively model applications, users and envs
• You can easily add secure, dynamic secrets retrieval to your manifests
Talking Tech: Puppet Webinar Series
CyberArk-Conjur Puppet Module
Talking Tech: Puppet Webinar Series
conjur.org: Open Source Secrets Management
Talking Tech: Puppet Webinar Series
Summary
Puppet and CyberArk Conjur enable organizations to provide better security and
increase developer and operations autonomy using infrastructure-as-code and
security-policy-as-code
Takeaways:
• Automate everything
• Abstract secrets from code
• Encrypt and rotate secrets
• Authenticate all requests
• Use Least Privilege principles
• Audit everything
Stay tuned for more webinars from CyberArk and Puppet ...
Talking Tech: Puppet Webinar Series
Questions?
Puppet OpenSource: https://www.conjur.org/
Conjur Puppet Module: https://forge.puppet.com/cyberark/conjur
Conjur OpenSource: https://www.conjur.org/
Conjur Slack channel: https://conjur.slack.com
Resources
Delivering Infrastructure and Security Policy as Code with Puppet and CyberArk Conjur

More Related Content

What's hot

AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 
Why should developers care about container security?
Why should developers care about container security?Why should developers care about container security?
Why should developers care about container security?Eric Smalling
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment securityDevSecCon
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Guy Podjarny
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps SecRubal Jain
 
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...Dana Gardner
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOpsSetu Parimi
 
Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directoryPriyanka Aash
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or lessMohammed A. Imran
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Mirco Vanini
 
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...AppSolid by SEWORKS
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseTonex
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7
 
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...Veronique Wagon
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Top API Security Issues Found During POCs
Top API Security Issues Found During POCsTop API Security Issues Found During POCs
Top API Security Issues Found During POCs42Crunch
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)PrashantDhakol
 
API 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsAPI 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsJoel W. King
 

What's hot (20)

AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
Why should developers care about container security?
Why should developers care about container security?Why should developers care about container security?
Why should developers care about container security?
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
 
Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)Third Party Performance (Velocity, 2014)
Third Party Performance (Velocity, 2014)
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
Making APIs Secure Demands Tracing and Machine Learning to Rapidly Limit Dama...
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directory
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or less
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
Six Strategies for Protecting Mobile Games Against Hackers, Crackers, and Cop...
 
Sandboxing in .NET CLR
Sandboxing in .NET CLRSandboxing in .NET CLR
Sandboxing in .NET CLR
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps CourseDevSecOps Training Bootcamp - A Practical DevSecOps Course
DevSecOps Training Bootcamp - A Practical DevSecOps Course
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Top API Security Issues Found During POCs
Top API Security Issues Found During POCsTop API Security Issues Found During POCs
Top API Security Issues Found During POCs
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
 
API 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsAPI 102: Programming with Meraki APIs
API 102: Programming with Meraki APIs
 

Similar to Delivering Infrastructure and Security Policy as Code with Puppet and CyberArk Conjur

PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...Puppet
 
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOps
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOpsShift Left: Puppet + CloudPassage = New Approach to Securing DevOps
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOpsClaire Priester Papas
 
Intro to Puppet Enterprise 06.28.2017
Intro to Puppet Enterprise 06.28.2017Intro to Puppet Enterprise 06.28.2017
Intro to Puppet Enterprise 06.28.2017Puppet
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionLeMeniz Infotech
 
Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017Claire Priester Papas
 
Is DevOps Braking Your Company?
Is DevOps Braking Your Company?Is DevOps Braking Your Company?
Is DevOps Braking Your Company?conjur_inc
 
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Claire Priester Papas
 
Introduction to Puppet Enterprise
Introduction to Puppet Enterprise Introduction to Puppet Enterprise
Introduction to Puppet Enterprise Puppet
 
Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...
Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...
Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...SonjaChevre
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet EnterprisePuppet
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020Royston Lobo
 
KCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an OpportunityKCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an OpportunityAndreas Grabner
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet EnterprisePuppet
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Mauricio Velazco
 
Intro to Puppet Enterprise Webinar 07.27.2017
Intro to Puppet Enterprise Webinar 07.27.2017Intro to Puppet Enterprise Webinar 07.27.2017
Intro to Puppet Enterprise Webinar 07.27.2017Claire Priester Papas
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security AgileOleg Gryb
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...PranavPatil822557
 
Intro to Puppet Enterprise for a Windows Environment - 08.23
Intro to Puppet Enterprise for a Windows Environment - 08.23Intro to Puppet Enterprise for a Windows Environment - 08.23
Intro to Puppet Enterprise for a Windows Environment - 08.23Puppet
 
Smart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantSmart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantTezpur University
 

Similar to Delivering Infrastructure and Security Policy as Code with Puppet and CyberArk Conjur (20)

PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
 
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOps
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOpsShift Left: Puppet + CloudPassage = New Approach to Securing DevOps
Shift Left: Puppet + CloudPassage = New Approach to Securing DevOps
 
Intro to Puppet Enterprise 06.28.2017
Intro to Puppet Enterprise 06.28.2017Intro to Puppet Enterprise 06.28.2017
Intro to Puppet Enterprise 06.28.2017
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017
 
Is DevOps Braking Your Company?
Is DevOps Braking Your Company?Is DevOps Braking Your Company?
Is DevOps Braking Your Company?
 
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
 
Introduction to Puppet Enterprise
Introduction to Puppet Enterprise Introduction to Puppet Enterprise
Introduction to Puppet Enterprise
 
Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...
Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...
Migrating from OpenTracing to OpenTelemetry - Kubernetes Community Days Munic...
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet Enterprise
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
 
KCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an OpportunityKCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
KCD Munich - Cloud Native Platform Dilemma - Turning it into an Opportunity
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet Enterprise
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
 
Intro to Puppet Enterprise Webinar 07.27.2017
Intro to Puppet Enterprise Webinar 07.27.2017Intro to Puppet Enterprise Webinar 07.27.2017
Intro to Puppet Enterprise Webinar 07.27.2017
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security Agile
 
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
Machine Learning , Analytics & Cyber Security the Next Level Threat Analytics...
 
Código Seguro
Código SeguroCódigo Seguro
Código Seguro
 
Intro to Puppet Enterprise for a Windows Environment - 08.23
Intro to Puppet Enterprise for a Windows Environment - 08.23Intro to Puppet Enterprise for a Windows Environment - 08.23
Intro to Puppet Enterprise for a Windows Environment - 08.23
 
Smart Home Automation using Voice Assistant
Smart Home Automation using Voice AssistantSmart Home Automation using Voice Assistant
Smart Home Automation using Voice Assistant
 

More from Claire Priester Papas

Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018Claire Priester Papas
 
Easily adapt Puppet Modules with PDK Convert 02/22/2018
Easily adapt Puppet Modules with PDK Convert 02/22/2018Easily adapt Puppet Modules with PDK Convert 02/22/2018
Easily adapt Puppet Modules with PDK Convert 02/22/2018Claire Priester Papas
 
Automation for the Modern Enterprise_26oct2017
Automation for the Modern Enterprise_26oct2017Automation for the Modern Enterprise_26oct2017
Automation for the Modern Enterprise_26oct2017Claire Priester Papas
 
Automation for the Modern Enterprise - 18 October 2017
Automation for the Modern Enterprise - 18 October 2017Automation for the Modern Enterprise - 18 October 2017
Automation for the Modern Enterprise - 18 October 2017Claire Priester Papas
 
Key Findings from the 2017 State of DevOps Report 06.08.2017
Key Findings from the 2017 State of DevOps Report 06.08.2017Key Findings from the 2017 State of DevOps Report 06.08.2017
Key Findings from the 2017 State of DevOps Report 06.08.2017Claire Priester Papas
 

More from Claire Priester Papas (6)

Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018Critical Considerations for Continuous Delivery 04.09.2018
Critical Considerations for Continuous Delivery 04.09.2018
 
Easily adapt Puppet Modules with PDK Convert 02/22/2018
Easily adapt Puppet Modules with PDK Convert 02/22/2018Easily adapt Puppet Modules with PDK Convert 02/22/2018
Easily adapt Puppet Modules with PDK Convert 02/22/2018
 
Automation for the Modern Enterprise_26oct2017
Automation for the Modern Enterprise_26oct2017Automation for the Modern Enterprise_26oct2017
Automation for the Modern Enterprise_26oct2017
 
Automation for the Modern Enterprise - 18 October 2017
Automation for the Modern Enterprise - 18 October 2017Automation for the Modern Enterprise - 18 October 2017
Automation for the Modern Enterprise - 18 October 2017
 
Apple IT Managing Containers
Apple IT Managing Containers Apple IT Managing Containers
Apple IT Managing Containers
 
Key Findings from the 2017 State of DevOps Report 06.08.2017
Key Findings from the 2017 State of DevOps Report 06.08.2017Key Findings from the 2017 State of DevOps Report 06.08.2017
Key Findings from the 2017 State of DevOps Report 06.08.2017
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Delivering Infrastructure and Security Policy as Code with Puppet and CyberArk Conjur

  • 1. Puppet presents “Talking Tech” A new webinar series featuring exciting technology solutions that are driving the industry forward Delivering Infrastructure and Security Policy as Code with Puppet and CyberArk Conjur Date: Wednesday, 8 November 2017 Manage F5 BIG-IP Infrastructure with Puppet Date: Tuesday, 14 November Shift Left: Puppet + CloudPassage = New Approach to Securing DevOps Date: Wednesday, 15 November
  • 3. Presenters Jeff Schmied Director Information Technology Puppet Ryan Prior Software Engineer @ryanprior CyberArk Talking Tech: Puppet Webinar Series
  • 4. Automating Rapid Delivery, Securely Infrastructure-as-Code IT infrastructure managed and provisioned through code, rather than manual processes Security-as-Code Automating security policy enforcement through code, rather than manual processes Talking Tech: Puppet Webinar Series
  • 5. Agenda • Enterprise Information Security Perspective • Overview of CyberArk Conjur • Overview of Puppet and DevOps • Security Challenges in DevOps Toolchain • Leading Practices • Example Code • Q&A Talking Tech: Puppet Webinar Series
  • 6. Privileged access management Data security in the cloud Social engineering Ransomware Vulnerability management Bring Your Own Device Nation-state cyber attacks Shadow IT Internet of Things What do I wake up worrying about? Talking Tech: Puppet Webinar Series
  • 7. Talking Tech: Puppet Webinar Series Database containing driver PII was compromised after storing keys in a publicly available repository (May 2014) XcodeGhost hack uses compiler backdoor to inject 3rd party code into developed applications (September 2015) Hacker accessed a Docker registry that contained the entire Vine source code, API keys, and other secrets (July 2016) Hackers have exploited known MongoDB vulnerabilities to plant ransomware into high-profile clients such as Emory Healthcare (January 2017) Exploits are targeting the application development tool stack
  • 8. Manually copied SSH keys to servers to provide access? Shared a key over chat? Manually configured or changed production servers? Stored secrets in config files in S3? Stored secrets in source control? Embedded passwords in applications? Confession time... Haven’t we all, at least once... Talking Tech: Puppet Webinar Series
  • 9. Your secrets and privileged accounts are the keys to your business. Every piece of infrastructure you operate uses secrets. CyberArk provides the tools and know-how to manage all your secrets, giving you total visibility and control. CyberArk is Proactive Security Talking Tech: Puppet Webinar Series
  • 10. Using a common language Across everything, no matter where it runs Puppet provides an automatic way to: know what you have control it and enforce consistency secure it and keep it compliant modernize it
  • 11. to the new wayfrom the old way DevOps Represents A Massive Shift Automatic, standard and scalable Delivering at will Inherent security Constantly modern Ad hoc, manual and error prone Infrequent delivery Security in silos Legacy platforms
  • 12. Traditional view of security: A bunch of suits preventing my killer app from going to prod Perspectives Matter An essential view of security: A thing that helps prevent the destruction of my employer, my job, my information Talking Tech: Puppet Webinar Series
  • 13. Securing secrets has evolved since Puppet’s early days Human Identity Degree of Security Less More Hiera-Eyaml - secrets abstracted and encrypted Conjur Secrets Store - secrets secured - key rotation Puppet Manifests - secrets exposed in code Time (& Scale!) Talking Tech: Puppet Webinar Series
  • 14. Some Good Practices • Encrypt secrets • Rotate secrets • Make secrets ephemeral • Authenticate all requests (Zero Trust) • Authorize minimally (Least Privilege) • Audit everything • Automate all of the above Talking Tech: Puppet Webinar Series
  • 15. Some Better Practices (Enlightened State) ▪ Workflows that support velocity and enhance security at the same time ▪ Security configuration is part of the development flow - i.e. in the same code repos as the applications - otherwise security and code get out of sync and deploys fail ▪ Security tools run separately from developer tools – to isolate secrets management from application code Talking Tech: Puppet Webinar Series
  • 16. Example CI Workflow w/ GitHub, Jenkins & Docker SECRETS REQUIRED! SECRETS REQUIRED! SECRETS REQUIRED! SECRETS REQUIRED! Talking Tech: Puppet Webinar Series
  • 17. How do these ideas apply to Puppet? Puppet Master Secret Store Staging App 1 App 2 App 3 Production App 1 App 2 App 3 Talking Tech: Puppet Webinar Series
  • 18. The Solution + Human Identity Talking Tech: Puppet Webinar Series
  • 19. Build on a chain of trust Authenticate all requests Authorize w/ least amount of privilege Audit everything ...and do it with code! Identity leads to effective access management Talking Tech: Puppet Webinar Series
  • 20. Machine Identity with Conjur PUPPET MASTER Puppet Admin Node Node Configuration Puppet Agent Puppet Agent Node Puppet Agent TEAM 1 TEAM NTEAM 2 Node obtains a Conjur access token, encrypts it, and places it in the “facts” • The Puppet master uses a Node’s identity to fetch secrets via the Conjur module. • A Node’s access to Secrets is defined in declarative Policies CyberArk-Conjur Conjur Module Talking Tech: Puppet Webinar Series
  • 21. Secure Workflow w/ Machine Identity Talking Tech: Puppet Webinar Series
  • 22. Puppet Manifest with Secrets ################## Site.pp ################## node 'default' { require secrets file { '/tmp/dbpass': ensure => file, content => "${secrets::postgres_password.unwrap}", show_diff => false, # don't log file content } file { '/tmp/token': ensure => file, content => "${secrets::vendor_oauth_token.unwrap}", show_diff => false, } } ################## Secrets.pp ################## class secrets { $vendor_oauth_token = Sensitive('5262e7a7-4cfd') $postgres_password = Sensitive('wake operator pure') } Talking Tech: Puppet Webinar Series
  • 23. Heira with Secrets ################## Site.pp ################## node 'default' { file { '/tmp/dbpass': ensure => file, content => "${hiera(‘postgres_password’)}", show_diff => false, # don't log file content } file { '/tmp/token': ensure => file, content => "${hiera(‘vendor_oauth_token’)}", show_diff => false, } } # oauth token $ eyaml encrypt '5262e7a7-4cfd' # database password $ eyaml encrypt 'wake operator pure' # instructions: # load these into Hiera, distribute keys to operators Talking Tech: Puppet Webinar Series
  • 24. Puppet Manifests using Conjur ################## Site.pp ################## node 'default' { require secrets file { '/tmp/dbpass': ensure => file, content => "${secrets::postgres_password.unwrap}", show_diff => false, # don't log file content } file { '/tmp/token': ensure => file, content => "${secrets::vendor_oauth_token.unwrap}", show_diff => false, } } ################## Secrets.pp ################## class { 'conjur': account => 'demo', appliance_url => 'http://conjur', authn_login => "host/app-${::trusted['hostname']}", host_factory_token => Sensitive('placeholder-for-HF-token'), version => 5, } class secrets { $vendor_oauth_token = conjur::secret('app/vendor-oauth-token') $postgres_password = conjur::secret('app/postgres-password') } Talking Tech: Puppet Webinar Series
  • 25. Conjur Policy that Controls Secrets Access - !policy id: app annotations: description: Conjur Puppet demo app policy body: # Roles - !layer app - !host-factory annotations: description: factory for new app node identities layers: [ !layer app ] # Secrets - !variable id: vendor-oauth-token annotations: description: authenticate vendor access to service endpoint - !variable id: postgres-password annotations: description: login credential for app database # Entitlements - !group users - !permit role: !group users privileges: [ read, execute ] resources: [ !variable vendor-oauth-token, !variable postgres- password ] - !grant role: !group users members: - !layer app Talking Tech: Puppet Webinar Series
  • 26. Tradeoffs to using identity to retrieve secrets... ▪ Pros: • Eliminates over-privileged central attack target • Enables fine grained control of secret retrieval & updating • Secrets are dynamically retrieved without writing a lot of code • Enables teams to self manage their application secrets (ex. staging) • All access is authenticated, authorized and audited (makes Security happy) ▪ Cons: Requires a one-time manifest change Talking Tech: Puppet Webinar Series
  • 27. Lessons We’ve Learned • It is possible to align Velocity and Security • If security is a bad UX, everybody loses • Established Security principles still apply, but must acknowledge new realities • Security policies should declaratively model applications, users and envs • You can easily add secure, dynamic secrets retrieval to your manifests Talking Tech: Puppet Webinar Series
  • 28. CyberArk-Conjur Puppet Module Talking Tech: Puppet Webinar Series
  • 29. conjur.org: Open Source Secrets Management Talking Tech: Puppet Webinar Series
  • 30. Summary Puppet and CyberArk Conjur enable organizations to provide better security and increase developer and operations autonomy using infrastructure-as-code and security-policy-as-code Takeaways: • Automate everything • Abstract secrets from code • Encrypt and rotate secrets • Authenticate all requests • Use Least Privilege principles • Audit everything Stay tuned for more webinars from CyberArk and Puppet ... Talking Tech: Puppet Webinar Series
  • 31. Questions? Puppet OpenSource: https://www.conjur.org/ Conjur Puppet Module: https://forge.puppet.com/cyberark/conjur Conjur OpenSource: https://www.conjur.org/ Conjur Slack channel: https://conjur.slack.com Resources