Compromising the credentials used by CI/CD tools can result in a vulnerable CI/CD pipeline and negatively impact the integrity of resulting products. Red Hat Ansible Engine can protect local credentials through tools such as ansible-vault and the ssh toolchain. Red Hat Ansible Tower takes that further through centralized management of various credentials and allows end users to leverage a secret in automating without ever exposing that secret to them. But Ansible may be one of several tools used in a typical CI/CD pipeline. How do you manage credentials and other secrets that are shared across your CI/CD tools and other systems without significant effort and the potential disruption to production? Enter CyberArk Application Access Manager (incorporates functionality previolsuly in Application Identity Manager).
In this webinar, attendees will learn about using CyberArk as a centralized secret management store and how it can be integrated to further enhance Ansible Engine and Ansible Tower workflows. We’ll also briefly touch on some of the other Ansible and CyberArk integrations, including CyberArk Conjur Open Source for DevOps environments and CyberArk Discovery and Audit (DNA) for discovery of credentials in Ansible Playbooks, Roles and Tasks.
Recommended for You

This webinar provides best practices for security teams to transform their access management programs from foundational to exceptional.

Join CyberArk and PwC for a fireside chat covering best practices for strengthening OT security.

Join us for an interactive session on Azure cloud.

What an Identity Security platform should offer and why.

Adopt endpoint privilege management for security, productivity, and compliance. Join ESG and CyberArk experts to explore benefits and trends.

Join CyberArk’s Andy Thompson as he shows how cookies and session IDs can be stolen with ease and how EPM can prevent this and emerging techniques.

Join our experts as we explore the critical role of least privilege in endpoint security and how to strengthen an organization’s security posture.

Watch how to protect and securely deploy your secrets in a multi-cloud world.

Watch this on-demand webinar to learn more about The Future of Access Management.

Principle of least privilege access is a cloud security best practice promoted by cloud providers. During the webinar attendees will learn about risks of overly broad permissions and how to address.

Learn how CyberArk fits into a Zero Trust architecture and allows for significant risk reduction

Learn how policy-based role-specific least privilege delivers control over privileged actions on servers and how to reduce privilege risk with the QuickStart framework.

Watch Practical Least Privilege to learn about benefits of role-specific least privilege and how to stay on track for endpoint security.

Hear Eric O'Neill, National Security Strategist, discuss the notions of foundational security measures and Zero Trust.

Learn how to orchestrate threat responses leveraging contextual identity data with CyberArk Identity Flows, a low-code orchestration solution.

Learn about the pros and cons of different methods of storing, sharing and protecting passwords for business applications.

How CyberArk and AWS provide simple and effective secrets management.

Puppet, Chef, Ansible, and others are great for developers but pose serious risk.

2023 Attack and Defend Virtual Series Session One

If the entire security industry warped into a Galaxy Far, Far, Away, are we wrong to think that Identity Security would be the force that surrounds us?