DevOps methodologies can help accelerate the pace of development and reduce costs, but DevOps practices can also introduce security vulnerabilities. Secrets are often embedded into applications and can be found on publicly assessible storage systems or code repositories like GitHub. DevOps requires a new approach to privileged access management—a centralized approach that removes credentials and secrets from applications, source code control systems, and repositories, and unifies reporting and administration. In this webinar, experts from CyberArk and CloudBees review DevOps security challenges and explain how you can use CyberArk and CloudBees solutions to establish trust and mitigate risk across the DevOps pipeline.
You will learn how to:
- Manage secrets across the software development lifecycle
- Maintain an immutable audit trail
- Provision, manage and grant machine identities that are used in Jenkins