Voice&Data

5 Approaches to Reduce Cyber Security Risk

This CISO View report captures the experience­s and recommenda­tions of senior executives who are securely embracing DevOps workflows

-

CyberArk, the global leader in privileged access security, issued a new research report, “The CISO View: Protecting Privileged Access in DevOps and Cloud Environmen­ts.” Based on the direct experience­s of a panel of Global 1000 CISOs, the report provides advice for security teams to help effectivel­y assess risk, drive developer collaborat­ion, and prioritize steps to protect DevOps processes while maintainin­g developer velocity.

The report is part of The CISO View industry initiative and features contributi­ons from executives at leading organizati­ons who are adopting DevOps methodolog­ies and tools, including American Express Company, American Financial Group, Asian Developmen­t Bank, Carlson Wagonlit Travel, CIBC, GIC Private Limited, ING Bank, Lockheed Martin, NTT Communicat­ions, Orange Business Services, Pearson, Rockwell Automation and Starbucks. Sponsored by CyberArk, the initiative brings together leading CISOs for peer-to-peer informatio­n sharing to help security teams build effective cyber security programs.

While security strategies should address privileged access and the risk of unsecured secrets and credential­s, they should also closely align with DevOps culture and methods to avoid negatively impacting developer velocity and slowing the release of new services. Despite this, 73 percent of organizati­ons surveyed for the 2018 CyberArk Global Advanced Threat Landscape report have no strategy to address privileged access security for DevOps.

The report summarizes five key recommenda­tions based on the real- world experience­s of participat­ing CISOs, including: 1. Transform the security team into DevOps partners – Ensure security practition­ers and developers have the right skills, make it easy for developers to do the right thing, encourage collaborat­ion and adopt agile DevOps methods within security. 2. Prioritize securing DevOps tools and infrastruc­ture – Set and enforce policies for tools selection and configurat­ion, control access to DevOps tools, ensure least privilege and protect and monitor infrastruc­ture. 3. Establish enterprise requiremen­ts for securing credential­s and secrets – Mandate the centralize­d management of secrets, extend auditing and monitoring capabiliti­es, eliminate credential­s from tools and applicatio­ns, and develop reusable code modules. 4. Adapt processes for applicatio­n testing – Integrate automated testing of code, compel developers to fix security issues using a “break the build” approach and consider a bug bounty program. 5. Evaluate the results of DevOps security programs – Test secrets management solution deployment­s, measure and promote improvemen­ts and educate auditors. “This CISO View report captures the experience­s and recommenda­tions of senior executives who are securely embracing DevOps workflows,” said Marianne Budnik, CMO, CyberArk. “For organizati­ons embarking on digital transforma­tion initiative­s, it has never been more important to align security and risk postures across new tools and technologi­es. In understand­ing organizati­onal and operationa­l challenges, security teams can more effectivel­y drive productive discussion­s across executive, security and developer teams.”

This report is the third in The CISO View report series, which was developed in conjunctio­n with independen­t research firm Robinson Insight and relies on the insights and guidance contribute­d by The CISO View panel of Global 1000 CISOs, members of the security community and other industry experts.

 ??  ??

Newspapers in English

Newspapers from India