PAM Challenges: Optimizing Security in DevOps

PAM Challenges: Optimizing Security in DevOps

DevOps is not a fad; it is a constant trend being adopted by more and more organizations every day. DevOps allows dynamic companies to unify development and IT operations, providing great benefits for the whole organization. Usually, IT operation teams and development teams have frictions due to different security cultures. Using DevOps removes this friction but does not solve the security problem. Instead, it gets hidden until a problem appears.

?

IT operation departments make use of PAM solutions to some degree, but development departments do not. Why? Simply because PAM solutions were designed for IT operation teams, and these tools simply don’t fit in the development lifecycle.

When using a traditional PAM solution, user access to critical assets is monitored. Typical critical assets are operating systems, network devices, or databases. But DevOps has introduced a new type of critical assets: containers and secrets.

Developers can still use their common tools to configure containers. A typical workflow can be as follows:

This is the standard process, but when some problem arises, developers need access to the production containers. Giving them the credentials required to get access to the containers is dangerous and potentially harmful.

To avoid it, the best PAM solutions must provide a mechanism to get access to these containers using a shell-like session. In this case, the session should be recorded, and any keystroke or file transfer will be registered. The PAM solution will be able to detect risky or forbidden usages, like side movements or software installations.

Another aspect is the secrets. The PAM solution should be able to timely change the passwords required to access a relational database and reconfigure the applications that use them. In most cases, the application gathers the credential from the Kubernetes secrets. The PAM solution must be able to update Kubernetes secrets accordingly, in a transparent and secure way.

With PAM and IAM engines integrated into a Converged Identity Platform, we can leverage the IAM engine to provide the best PAM experience for any system architecture you have, including DevOps operations based on microcontainers. With our approach, you can get all the benefits of DevOps operations without sacrificing security or agility.

In my experience managing these challenges, the integration of PAM and IAM engines into the Converged Identity Platform enables leveraging the IAM engine, providing the best PAM experience for any system architecture, including DevOps operations based on microcontainers. This approach ensures all the benefits of DevOps operations without sacrificing security or agility.

Antoni Juanico Soler

Ingeniero informático. Jefe de Sección en Administración de la Comunidad Autónoma de las Illes Balears

1 年

Artículo muy interesante y de lectura muy amena. Cómo CKAD me parece muy apropiado tratar, discutir y poner este tema encima de la mesa.

要查看或添加评论,请登录

Gabriel Buades的更多文章

  • Impact of Bugs in the Identity Management Process

    Impact of Bugs in the Identity Management Process

    Bugs have existed in computer science since the very first computer. Most of you probably know that the word bug…

    1 条评论
  • Deepseek

    Deepseek

    I’ve been playing around for some days with Deepseek, studying how to apply it in the security space. These are my…

  • Soffid IAM: 2024 in Review and What’s Coming in 2025

    Soffid IAM: 2024 in Review and What’s Coming in 2025

    We would like to share with you a brief recap of 2024 and the exciting new features that are on our roadmap for 2025…

  • Fast identities

    Fast identities

    Here you have two dishes. Both are made of beef, of course, but they are not the same at all.

  • Thoughts about federated login

    Thoughts about federated login

    Federated login has been used for a long time. The very first implementations were trying to leverage existing user…

  • Case Study: Citizen IAM

    Case Study: Citizen IAM

    I’d like to share a unique case of Citizen Identity and Access Management (CIAM). Typically, CIAM refers to Customer…

  • Case Study: PAM in the Finance Sector

    Case Study: PAM in the Finance Sector

    Our customer needed to achieve some security improvements to obtain PCI-DSS certification. This story tells how we…

    1 条评论
  • Success Case in Converged Identity Management

    Success Case in Converged Identity Management

    I am proud to share some details about a success story in converged identity management. Perhaps it should be called a…

    1 条评论
  • Open Source IGA: A Transparent Path to Stronger Security and Efficiency

    Open Source IGA: A Transparent Path to Stronger Security and Efficiency

    Last week, a potential customer asked me why we share our code base for free. From his point of view, it didn’t make…

  • The Wind is Shifting in Identity Management

    The Wind is Shifting in Identity Management

    In the last two years, we’ve seen a massive migration from on-premise Exchange to Office 365. In many cases, it has not…

    1 条评论

社区洞察

其他会员也浏览了