sb-as logo
Story image

Thycotic launches DevOps Secrets Vault solution for greater cloud security

Thycotic has launched a new ‘just in time’ functionality for cloud platform access security. The DevOps Secrets Vault solution supports dynamic secrets creation for infrastructure-as-a-service (IaaS) platforms Amazon Web Services (AWS), Microsoft Azure (Azure) and Google Cloud Platform (GCP), the company states.

Using this solution, organisations can ensure dynamic secrets are automatically generated at the time of request and can be used when a user or resource, such as a configuration tool, needs a credential with an expiry time.

Dynamic secrets also enable fine-grained authorisation through cloud policies. Furthermore, DevOps Secrets Vault integrates with additional tools in the DevOps pipeline, according to Thycotic.

Utilising a cloud-based AWS architecture, DevOps Secrets Vault offers rapid deployment, elastic scalability, and is purpose-built to handle the high-speed secrets management needs of many DevOps environments.

DevOps Secrets Vault now supports secrets access for Chef and Puppet and includes software development kits (SDKs) for Ruby and .NET. DevOps Secrets Vault also integrates with Jenkins, Kubernetes, Terraform and Ansible, and includes SDKs for Java, Go and Python.

In addition, users can authenticate to DevOps Secrets Vault through AWS, Azure, GCP and Thycotic One methods. GCP support includes the ability to authenticate via service and user accounts, Google Compute Engines (GCE) and Google Kubernetes Engines (GKE).

Thycotic One enables single sign-on and two-factor authentication via both TOTP and SMS methods.

According to IDG, almost two-thirds (61%) of companies use platform-as-a-service (PaaS), 89% use software-as-a-service (SaaS), and 73% use IaaS.

The impact of lost or stolen secrets on cloud platforms ranges from temporary disruptions to critical data loss.

Thycotic states that as organisations build software and applications on cloud IaaS platforms, the DevOps tools they use to manage that process include both open-source and commercial software, plug-ins to other tools, and library dependencies.

While this can advance operations, it’s possible to have vulnerabilities or misconfigurations that leak secrets, Thycotic states.

This happens when information isn’t improperly stored in memory or on disk, sent to logging systems, or leaked to other tools or processes.

Thycotic vice president of product management Jai Dargan says, “The exponential growth of hybrid multi-cloud adoption is continuing to stress-test existing security models and conventional approaches to Privileged Access Management.

“We know that organisations will migrate workloads to AWS, Azure and GCP at record speed this year, so CISOs need to do everything they can with the available solutions they have to limit risk associated with secrets proliferation.

“DevOps Secrets Vault is a cloud-based vault that balances the security and velocity that DevOps teams require for this growing part of the enterprise attack surface.

"With dynamic secrets, we have added a just-in-time approach to secrets management that further reduces the risk of compromised credentials.”

Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
Snyk powers forward following financing round, expands leadership team
Snyk has closed its Series E financing round, totalling $300 million, and has expanded its leadership team to deliver advanced security to companies around the globe.More
Story image
Zscaler and CrowdStrike release integrations for end-to-end security
This collaboration between the two cloud-native security companies provides joint customers with adaptive, risk-based access control to private applications.More
Story image
APAC financial firms bite down as crime compliance costs rise
The total projected cost of financial crime compliance within Asia Pacific firms reached US$12.06 billion, according to a new report.More
Story image
Hackers offering forged “official” COVID vaccination certificates and negative test results on dark net 
There has been a 350% increase in the number of advertisements selling alleged COVID vaccines within the last three months.More