SlideShare a Scribd company logo
PKI in DevOps:
HOW TO DEPLOY CERTIFICATE AUTOMATION IN CI/CD
CYBERSECURITY SME
INFINITE RANGES
CHRIS PAUL
VP, SOLUTIONS ENGINEERING
KEYFACTOR
ANTHONY RICCI
PRODUCT MANAGER
KEYFACTOR
RYAN SANDERS
2
A Bit About Chris
► Cyber Network Warfare Specialist
► Military Intelligence Systems Maintainer/Integrator
► NOC/SOC
► Tech Lead/Engineer
► Cyber Course Developer
► Cyber Operations Instructor (Contractor)
CYBERSECURITY SME
CHRIS PAUL
3
DevOps Mantra vs Security
Deliver Fast
Nearly 60% deploy multiple times a day, once a
day, or once every few days.
Run Anywhere
Almost 70% of Ops pros report that developers
can provision their own environments.
Automate Everything
A majority of Ops teams (38%) described the
development lifecycle as “mostly automated.”
But…Security is Left Out
Most sec teams don’t have security processes in
place for microservices/containers/APIs/cloud
native or serverless.
And Who Really Owns it?
33% of security respondents say they own
security, but almost as many (29%) said everyone
is responsible for security. Clarity is needed.
*GitLab – Mapping the DevSecOps Landscape | 2020 Survey Results
CYBERSECURITY SME
CHRIS PAUL
4
Cybersecurity Concerns
⊲ Do you know where all your critical assets are?
⊲ Are you confident these assets are deployed
and configured to meet business objectives?
⊲ Are you confident in your ability to measure
drift in these configurations?
CYBERSECURITY SME
CHRIS PAUL
⊲ Lack of oversight and control
⊲ Poor configuration or accidental
misconfiguration
⊲ Environmental drift
Top Cybersecurity Concerns: Questions to ask yourself:
5
Poll Question #1
What are the biggest challenges your organization faces from an
information security perspective?
Increasing complexity of IT / infrastructure1
Lack of cybersecurity skills / resources2
Compliance with privacy laws / regulations3
Keeping up with internal / external threats4
Day-to-day hotspots take too much time5
6
Traditional PKI vs Modern PKI
PRODUCT MARKETING MGR
RYAN SANDERS
Web Servers
Wi-Fi / VPN
Email / Documents
THEN
Traditional PKI
CI/CD Tools
Containers
Orchestration
ADC / CDN
Service Mesh
IoT Devices
Code Signing Mobile / MDM
NOW
Modern PKI
Cloud
DevOps
Mobile
IoT
DISRUPTION
88,750 Keys & Certificates
8 Internal/External CAs
Shorter Lifespans
Few Certificates
Spreadsheets / Scripts
Static Approach
PKI in DevOps
HOW X.509 CERTIFICATES FIT INTO DEVOPS & CI/CD
7
8
The CI/CD Pipeline
CODE COMMIT BUILD TEST RELEASE DELIVER PRODUCTION
CONTINUOUS
DELIVERY
CONTINUOUS
DEPLOYMENT
AUTOMATION
Developer pushes new
code and automatically
triggers server build
CI server starts the build
process and automated tests
against the build
Build artifacts are stored and
binaries are delivered to a
runtime environment
Build is deployed to
production (on-premise,
cloud, multi-cloud)
CONTINUOUS
INTEGRATION
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
9
So Many Tools…
SCM/VCS
CI
BUILD TESTING DEPLOYMENT
IAAS/PAAS
ORCHESTRATION
BI/MONITORING
PROVISIONING
ARTIFACT MGT.
DATABASE MGT.
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
1 0
Where X.509 Certificates Fit Into CI/CD
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
CODE COMMIT BUILD TEST RELEASE DELIVER PRODUCTION
Sign Build
Sign Containers
Sign Binaries
Sign Images
Web Servers
Load Balancers
Containers
Orchestration
Service Mesh
Secret Vaults
CI Tools
Build Automation
Repositories
Databases
1 1
The Modern PKI & Application Stack
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
Cloud CA / Vault Services
Embedded / Built-In Tools
Free CertsOpenSSL Vault
“DIY” PKIRequest Public CAs
Physical Infrastructure
Secrets
VMs VMsVMs
Cluster 1 Cluster 2
CDN / ADC
Clusters
Orchestration
Ingress/Service Mesh
ICA
ICA
ICA
ICA
ICA
What’s Working / What’s Not
MANAGING KEYS & CERTS IN DEVOPS ENVIRONMENTS
1 2
1 3
Developers can use any CA – for example, Let’s
Encrypt – or even generate certificates
themselves using popular utilities such as
OpenSSL…but there is little else in terms of
policy enforcement and PKI governance.
GARTNER
“The Resurgence of PKI in Certificate Management, the IoT and DevOps”
Erik Wahlstrom, Paul Rabinovich, October 2018
PRODUCT MARKETING MGR
RYAN SANDERS
1 4
Security & DevOps Challenges
InfoSec TeamsDev + Ops Teams
 Avoid time-consuming, manual request processes
 Use unauthorized or “DIY” CAs
 Use certificates from built-in DevOps / Cloud tools
 Issue non-compliant or self-signed certificates
 Fail to properly track certificates and expirations
 Limited visibility of certificates issued
 Unable to enforce consistent enterprise policy
 Lack control over CA/PKI infrastructure
 No accountability when something goes wrong
 Constantly chasing down non-compliant certificates
DevOps needs fast, easy access to certs.
InfoSec needs visibility and policy.
PRODUCT MARKETING MGR
RYAN SANDERS
1 5
Risk #1 • Outages & Breaches
2017
EQUIFAX
One expired certificate on network
monitoring device left Equifax
blind to the attack for 76 days.
MICROSOFT TEAMS
An expired authentication cert
stopped users from logging into
Teams for nearly three hours.
02/ERICSSON
Ericsson faces a £100 million bill
after millions of mobile users in
Japan / U.K. were impacted.
OCULUS RIFT
Users found out their VR headsets
were not working due to an
expired certificate.
LINKEDIN (AGAIN)
For the second time, LinkedIn
users experienced interruptions
caused by an expired cert.
LINKEDIN
For roughly two hours, LinkedIn
was down across most regions
due to an expired certificate.
FIREFOX
U.S. GOVERNMENT
2018 2019 2020
DOWNTIME
A certificate expires – Gartner
estimates network downtime
costs $300,000 per hour.
DISRUPTION
Services are disrupted – the
IT helpdesk/customer service
are inundated with calls.
RESPONSE
PKI/infosec take hours or
days to identify an expired
certificate as the root cause.
What happens
when an outage
strikes?
REMEDIATION
Teams must locate and
replace every instance of
the expired certificate.
CYBERSECURITY SME
CHRIS PAUL
1 6
Risk #2 • Crypto-Incidents
CYBERSECURITY SME
CHRIS PAUL
1 7
Risk #3 • Code Signing Attacks
CYBERSECURITY SME
CHRIS PAUL
2010
STUXNET
2015 2019
DUQU
2011 2012 2013 2014 2016 2017 2018
BIT9
MALAYSIAN GOV’T
ADOBE
OPERA
SONY
DUQU 2.0
D-LINK
SYNful KNOCK
SUCKFLY APT
D-LINK (AGAIN)
ASUS
APT41
Key Theft
Attackers find and steal
private keys to sell on the
dark web or sign malware.
Signing Breach
They infiltrate the code
signing process itself, despite
secure key storage.
Internal Misuse
Developers accidentally
publish private keys into
publicly accessible locations..
How is code signing
compromised?
1 8
Code Signing Use Case
MULTINATIONAL TECH COMPANY
⊲ Development teams in US East, West, and Israel
⊲ Multiple build server solutions – TFS, Jenkins, etc.
⊲ Multiple dev languages – .NET, C++, Java, iOS
⊲ More than 100+ different products to be signed
⊲ Certs deployed to build servers, managed manually
⊲ Signing process manual and “effort greedy”
PRODUCT MARKETING MGR
RYAN SANDERS
1 9
Poll Question #2
What would you say is your primary concern regarding the use of
keys and X.509 certificates in DevOps?
Manual, time-consuming processes1
Lack of visibility / unknown certificates2
No of control over issuance and usage3
Lack of accountability and ownership4
Insecure code signing / private keys5
How to Support DevSecOps
DEPLOY X.509 CERTIFICATE AUTOMATION IN CI/CD
2 0
2 1
The API economy forces organizations to
monitor not only their own certificates, but also
certificates issued and used by partners and
services that the organizations rely on.
GARTNER
“The Resurgence of PKI in Certificate Management, the IoT and DevOps”
Erik Wahlstrom, Paul Rabinovich, October 2018
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
2 2
Getting it Right • Ideal State
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
Visibility Control Automation
 Know where certificates are issued from
and all the locations they are installed
 Be able to respond to audit requests
 Understand how certificates are being
used and for which applications
 Continuously monitor issuance and
usage for abnormalities
 Ensure that certificates are issued from
a trusted, enterprise-sanctioned PKI
 Enforce consistent role-based access
and issuance policies
 Assign certificates to application groups
or owners for clear accountability
 Keep private keys and code signing
certificates locked down
 Support multiple CA tools and vendors
 Integrate with built-in issuers such as
Kubernetes, Istio, HashiCorp Vault
 Provide self-service access to
certificates for developers
 Automate certificate renewals and
provisioning
InfoSec controls the backend PKI.
Integrated with native tools and workflows.
2 3
Certificate Lifecycle Management (CLM)
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
PUBLIC CAs
PRIVATE CAs
SERVERS
ADC
CLOUD
EXISTING CERTIFICATE
PROCESSES
Direct CA
Integration
Inventory &
Automation
KEYFACTOR
COMMAND
Certificate
Stores
CAs
Direct Integration
No Middleware. Inventory, monitor
and renew certificates in place.
Crypto-Agility
Certificates can quickly be re-issued or
renewed from a different CA/template.
No Re-Engineering
No need to re-engineer workflows or
re-issue certs through our platform.
Scalability
The platform is tested and proven to in
environments of 500M+ certificates.
Private Key Storage
No need to store private keys in our
platform – per-template basis.
Extensibility
Modular design enables maximum
extensibility across infrastructure.
No Middleware
2 4
Secure Code Signing Operations
VP, SOLUTIONS ENGINEERING
ANTHONY RICCI
STEP 1
Developer submits code to be signed
via user interface, API, or CSP / KSP.
STEP 3
Keyfactor Code Assure signs code
without keys ever leaving the HSM..
STEP 4
InfoSec and PKI teams can audit
code signing activity throughout..
STEP 2
Signing request is allowed or denied
based on policies set by the admins.
WORKSTATION
SIGNING SERVER
BUILD SERVER
SIGNING TOOL
SIGNING TOOL
SIGNING TOOL
CODE
CODE
CODE
DEVELOPERS
USER INTERFACE
API
CSP / KSP
DEVELOPERS
DEVELOPERS
ADMIN PORTAL
POLICY ENGINE
ADMINS
PHYSICAL OR CLOUD HSM
1 2
Audit Logs
3
4
It’s Q&A Time
DON’T BE SHY, WE WANT TO HEAR FROM YOU
2 5
Thank You
2 6
CYBERSECURITY SME, INFINITE RANGES
CHRIS PAUL
VP, SOLUTIONS ENGINEERING, KEYFACTOR
ANTHONY RICCI
PRODUCT MANAGER, KEYFACTOR
RYAN SANDERS
cpaul@infiniteranges.com
anthony.ricci@keyfactor.com
ryan.sanders@keyfactor.com

More Related Content

What's hot

[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Mohammed A. Imran
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Amazon Web Services
 
Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)
Pedro Sousa
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
Amazon Web Services
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
Lorenzo Barbieri
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
Software Composition Analysis Deep Dive
Software Composition Analysis Deep DiveSoftware Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
NotSoSecure Global Services
 
The Role of IAM in Microservices
The Role of IAM in MicroservicesThe Role of IAM in Microservices
The Role of IAM in Microservices
WSO2
 
DevSecOps: Security With DevOps
DevSecOps: Security With DevOpsDevSecOps: Security With DevOps
DevSecOps: Security With DevOps
Knoldus Inc.
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
Prabath Siriwardena
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
DevOps Indonesia
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
DevOps.com
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
Amazon Web Services
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
Amazon Web Services
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
kloia
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 

What's hot (20)

[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
CTAP
CTAPCTAP
CTAP
 
Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)Lets talk about: Azure Kubernetes Service (AKS)
Lets talk about: Azure Kubernetes Service (AKS)
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
Software Composition Analysis Deep Dive
Software Composition Analysis Deep DiveSoftware Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
The Role of IAM in Microservices
The Role of IAM in MicroservicesThe Role of IAM in Microservices
The Role of IAM in Microservices
 
DevSecOps: Security With DevOps
DevSecOps: Security With DevOpsDevSecOps: Security With DevOps
DevSecOps: Security With DevOps
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 

Similar to PKI in DevOps: How to Deploy Certificate Automation within CI/CD

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
Savinder Puri
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
Eric Smalling
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
GlobalSign
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
Cisco DevNet
 
DockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, SaferDockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, Safer
Docker, Inc.
 
Dockercon 2015 - Faster Cheaper Safer
Dockercon 2015 - Faster Cheaper SaferDockercon 2015 - Faster Cheaper Safer
Dockercon 2015 - Faster Cheaper Safer
Adrian Cockcroft
 
Código Seguro
Código SeguroCódigo Seguro
Código Seguro
Thiago Bertuzzi
 
How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?
mirmaisam
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
Adrian Sanabria
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Curiosity and Testery Present: Hitting the right test coverage for CI/CD
Curiosity and Testery Present: Hitting the right test coverage for CI/CDCuriosity and Testery Present: Hitting the right test coverage for CI/CD
Curiosity and Testery Present: Hitting the right test coverage for CI/CD
Curiosity Software Ireland
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
LeMeniz Infotech
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
Symantec
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI Pipelines
Codefresh
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
NCCOMMS
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
ThousandEyes
 

Similar to PKI in DevOps: How to Deploy Certificate Automation within CI/CD (20)

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
DockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, SaferDockerCon SF 2015: Faster, Cheaper, Safer
DockerCon SF 2015: Faster, Cheaper, Safer
 
Dockercon 2015 - Faster Cheaper Safer
Dockercon 2015 - Faster Cheaper SaferDockercon 2015 - Faster Cheaper Safer
Dockercon 2015 - Faster Cheaper Safer
 
Código Seguro
Código SeguroCódigo Seguro
Código Seguro
 
How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Curiosity and Testery Present: Hitting the right test coverage for CI/CD
Curiosity and Testery Present: Hitting the right test coverage for CI/CDCuriosity and Testery Present: Hitting the right test coverage for CI/CD
Curiosity and Testery Present: Hitting the right test coverage for CI/CD
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryptionSecuring broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Introducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI PipelinesIntroducing a Security Feedback Loop to your CI Pipelines
Introducing a Security Feedback Loop to your CI Pipelines
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 

More from DevOps.com

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
DevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
DevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
DevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
DevOps.com
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
DevOps.com
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
DevOps.com
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
DevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 

More from DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

PKI in DevOps: How to Deploy Certificate Automation within CI/CD

  • 1. PKI in DevOps: HOW TO DEPLOY CERTIFICATE AUTOMATION IN CI/CD CYBERSECURITY SME INFINITE RANGES CHRIS PAUL VP, SOLUTIONS ENGINEERING KEYFACTOR ANTHONY RICCI PRODUCT MANAGER KEYFACTOR RYAN SANDERS
  • 2. 2 A Bit About Chris ► Cyber Network Warfare Specialist ► Military Intelligence Systems Maintainer/Integrator ► NOC/SOC ► Tech Lead/Engineer ► Cyber Course Developer ► Cyber Operations Instructor (Contractor) CYBERSECURITY SME CHRIS PAUL
  • 3. 3 DevOps Mantra vs Security Deliver Fast Nearly 60% deploy multiple times a day, once a day, or once every few days. Run Anywhere Almost 70% of Ops pros report that developers can provision their own environments. Automate Everything A majority of Ops teams (38%) described the development lifecycle as “mostly automated.” But…Security is Left Out Most sec teams don’t have security processes in place for microservices/containers/APIs/cloud native or serverless. And Who Really Owns it? 33% of security respondents say they own security, but almost as many (29%) said everyone is responsible for security. Clarity is needed. *GitLab – Mapping the DevSecOps Landscape | 2020 Survey Results CYBERSECURITY SME CHRIS PAUL
  • 4. 4 Cybersecurity Concerns ⊲ Do you know where all your critical assets are? ⊲ Are you confident these assets are deployed and configured to meet business objectives? ⊲ Are you confident in your ability to measure drift in these configurations? CYBERSECURITY SME CHRIS PAUL ⊲ Lack of oversight and control ⊲ Poor configuration or accidental misconfiguration ⊲ Environmental drift Top Cybersecurity Concerns: Questions to ask yourself:
  • 5. 5 Poll Question #1 What are the biggest challenges your organization faces from an information security perspective? Increasing complexity of IT / infrastructure1 Lack of cybersecurity skills / resources2 Compliance with privacy laws / regulations3 Keeping up with internal / external threats4 Day-to-day hotspots take too much time5
  • 6. 6 Traditional PKI vs Modern PKI PRODUCT MARKETING MGR RYAN SANDERS Web Servers Wi-Fi / VPN Email / Documents THEN Traditional PKI CI/CD Tools Containers Orchestration ADC / CDN Service Mesh IoT Devices Code Signing Mobile / MDM NOW Modern PKI Cloud DevOps Mobile IoT DISRUPTION 88,750 Keys & Certificates 8 Internal/External CAs Shorter Lifespans Few Certificates Spreadsheets / Scripts Static Approach
  • 7. PKI in DevOps HOW X.509 CERTIFICATES FIT INTO DEVOPS & CI/CD 7
  • 8. 8 The CI/CD Pipeline CODE COMMIT BUILD TEST RELEASE DELIVER PRODUCTION CONTINUOUS DELIVERY CONTINUOUS DEPLOYMENT AUTOMATION Developer pushes new code and automatically triggers server build CI server starts the build process and automated tests against the build Build artifacts are stored and binaries are delivered to a runtime environment Build is deployed to production (on-premise, cloud, multi-cloud) CONTINUOUS INTEGRATION VP, SOLUTIONS ENGINEERING ANTHONY RICCI
  • 9. 9 So Many Tools… SCM/VCS CI BUILD TESTING DEPLOYMENT IAAS/PAAS ORCHESTRATION BI/MONITORING PROVISIONING ARTIFACT MGT. DATABASE MGT. VP, SOLUTIONS ENGINEERING ANTHONY RICCI
  • 10. 1 0 Where X.509 Certificates Fit Into CI/CD VP, SOLUTIONS ENGINEERING ANTHONY RICCI CODE COMMIT BUILD TEST RELEASE DELIVER PRODUCTION Sign Build Sign Containers Sign Binaries Sign Images Web Servers Load Balancers Containers Orchestration Service Mesh Secret Vaults CI Tools Build Automation Repositories Databases
  • 11. 1 1 The Modern PKI & Application Stack VP, SOLUTIONS ENGINEERING ANTHONY RICCI Cloud CA / Vault Services Embedded / Built-In Tools Free CertsOpenSSL Vault “DIY” PKIRequest Public CAs Physical Infrastructure Secrets VMs VMsVMs Cluster 1 Cluster 2 CDN / ADC Clusters Orchestration Ingress/Service Mesh ICA ICA ICA ICA ICA
  • 12. What’s Working / What’s Not MANAGING KEYS & CERTS IN DEVOPS ENVIRONMENTS 1 2
  • 13. 1 3 Developers can use any CA – for example, Let’s Encrypt – or even generate certificates themselves using popular utilities such as OpenSSL…but there is little else in terms of policy enforcement and PKI governance. GARTNER “The Resurgence of PKI in Certificate Management, the IoT and DevOps” Erik Wahlstrom, Paul Rabinovich, October 2018 PRODUCT MARKETING MGR RYAN SANDERS
  • 14. 1 4 Security & DevOps Challenges InfoSec TeamsDev + Ops Teams  Avoid time-consuming, manual request processes  Use unauthorized or “DIY” CAs  Use certificates from built-in DevOps / Cloud tools  Issue non-compliant or self-signed certificates  Fail to properly track certificates and expirations  Limited visibility of certificates issued  Unable to enforce consistent enterprise policy  Lack control over CA/PKI infrastructure  No accountability when something goes wrong  Constantly chasing down non-compliant certificates DevOps needs fast, easy access to certs. InfoSec needs visibility and policy. PRODUCT MARKETING MGR RYAN SANDERS
  • 15. 1 5 Risk #1 • Outages & Breaches 2017 EQUIFAX One expired certificate on network monitoring device left Equifax blind to the attack for 76 days. MICROSOFT TEAMS An expired authentication cert stopped users from logging into Teams for nearly three hours. 02/ERICSSON Ericsson faces a £100 million bill after millions of mobile users in Japan / U.K. were impacted. OCULUS RIFT Users found out their VR headsets were not working due to an expired certificate. LINKEDIN (AGAIN) For the second time, LinkedIn users experienced interruptions caused by an expired cert. LINKEDIN For roughly two hours, LinkedIn was down across most regions due to an expired certificate. FIREFOX U.S. GOVERNMENT 2018 2019 2020 DOWNTIME A certificate expires – Gartner estimates network downtime costs $300,000 per hour. DISRUPTION Services are disrupted – the IT helpdesk/customer service are inundated with calls. RESPONSE PKI/infosec take hours or days to identify an expired certificate as the root cause. What happens when an outage strikes? REMEDIATION Teams must locate and replace every instance of the expired certificate. CYBERSECURITY SME CHRIS PAUL
  • 16. 1 6 Risk #2 • Crypto-Incidents CYBERSECURITY SME CHRIS PAUL
  • 17. 1 7 Risk #3 • Code Signing Attacks CYBERSECURITY SME CHRIS PAUL 2010 STUXNET 2015 2019 DUQU 2011 2012 2013 2014 2016 2017 2018 BIT9 MALAYSIAN GOV’T ADOBE OPERA SONY DUQU 2.0 D-LINK SYNful KNOCK SUCKFLY APT D-LINK (AGAIN) ASUS APT41 Key Theft Attackers find and steal private keys to sell on the dark web or sign malware. Signing Breach They infiltrate the code signing process itself, despite secure key storage. Internal Misuse Developers accidentally publish private keys into publicly accessible locations.. How is code signing compromised?
  • 18. 1 8 Code Signing Use Case MULTINATIONAL TECH COMPANY ⊲ Development teams in US East, West, and Israel ⊲ Multiple build server solutions – TFS, Jenkins, etc. ⊲ Multiple dev languages – .NET, C++, Java, iOS ⊲ More than 100+ different products to be signed ⊲ Certs deployed to build servers, managed manually ⊲ Signing process manual and “effort greedy” PRODUCT MARKETING MGR RYAN SANDERS
  • 19. 1 9 Poll Question #2 What would you say is your primary concern regarding the use of keys and X.509 certificates in DevOps? Manual, time-consuming processes1 Lack of visibility / unknown certificates2 No of control over issuance and usage3 Lack of accountability and ownership4 Insecure code signing / private keys5
  • 20. How to Support DevSecOps DEPLOY X.509 CERTIFICATE AUTOMATION IN CI/CD 2 0
  • 21. 2 1 The API economy forces organizations to monitor not only their own certificates, but also certificates issued and used by partners and services that the organizations rely on. GARTNER “The Resurgence of PKI in Certificate Management, the IoT and DevOps” Erik Wahlstrom, Paul Rabinovich, October 2018 VP, SOLUTIONS ENGINEERING ANTHONY RICCI
  • 22. 2 2 Getting it Right • Ideal State VP, SOLUTIONS ENGINEERING ANTHONY RICCI Visibility Control Automation  Know where certificates are issued from and all the locations they are installed  Be able to respond to audit requests  Understand how certificates are being used and for which applications  Continuously monitor issuance and usage for abnormalities  Ensure that certificates are issued from a trusted, enterprise-sanctioned PKI  Enforce consistent role-based access and issuance policies  Assign certificates to application groups or owners for clear accountability  Keep private keys and code signing certificates locked down  Support multiple CA tools and vendors  Integrate with built-in issuers such as Kubernetes, Istio, HashiCorp Vault  Provide self-service access to certificates for developers  Automate certificate renewals and provisioning InfoSec controls the backend PKI. Integrated with native tools and workflows.
  • 23. 2 3 Certificate Lifecycle Management (CLM) VP, SOLUTIONS ENGINEERING ANTHONY RICCI PUBLIC CAs PRIVATE CAs SERVERS ADC CLOUD EXISTING CERTIFICATE PROCESSES Direct CA Integration Inventory & Automation KEYFACTOR COMMAND Certificate Stores CAs Direct Integration No Middleware. Inventory, monitor and renew certificates in place. Crypto-Agility Certificates can quickly be re-issued or renewed from a different CA/template. No Re-Engineering No need to re-engineer workflows or re-issue certs through our platform. Scalability The platform is tested and proven to in environments of 500M+ certificates. Private Key Storage No need to store private keys in our platform – per-template basis. Extensibility Modular design enables maximum extensibility across infrastructure. No Middleware
  • 24. 2 4 Secure Code Signing Operations VP, SOLUTIONS ENGINEERING ANTHONY RICCI STEP 1 Developer submits code to be signed via user interface, API, or CSP / KSP. STEP 3 Keyfactor Code Assure signs code without keys ever leaving the HSM.. STEP 4 InfoSec and PKI teams can audit code signing activity throughout.. STEP 2 Signing request is allowed or denied based on policies set by the admins. WORKSTATION SIGNING SERVER BUILD SERVER SIGNING TOOL SIGNING TOOL SIGNING TOOL CODE CODE CODE DEVELOPERS USER INTERFACE API CSP / KSP DEVELOPERS DEVELOPERS ADMIN PORTAL POLICY ENGINE ADMINS PHYSICAL OR CLOUD HSM 1 2 Audit Logs 3 4
  • 25. It’s Q&A Time DON’T BE SHY, WE WANT TO HEAR FROM YOU 2 5
  • 26. Thank You 2 6 CYBERSECURITY SME, INFINITE RANGES CHRIS PAUL VP, SOLUTIONS ENGINEERING, KEYFACTOR ANTHONY RICCI PRODUCT MANAGER, KEYFACTOR RYAN SANDERS cpaul@infiniteranges.com anthony.ricci@keyfactor.com ryan.sanders@keyfactor.com