×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Red vs Blue: Best Practices for Jenkins Credentials Management

January 18, 2019

CyberArk Labs published research on Jenkins credentials management in to educate organizations on potential security risks and share recommended mitigations and best practices for ensuring security and DevOps velocity. Jenkins is an open source automation server used to accelerate the software delivery process. Widely considered the de facto standard in open source continuous integration tools, the server effectively acts as the DevOps engine, addressing everything from source code management to delivering code to production.

In this session, we demonstrate common attack techniques via red and blue team tactics and share measures organizations can take to secure secrets and ultimately, protect enterprise assets from common attacks.

Previous Video
Introducing zBang - an Open Source Tool to Discover Risks Associated with Privileged Accounts
Introducing zBang - an Open Source Tool to Discover Risks Associated with Privileged Accounts

CyberArk Cyber Researcher Asaf Hecht shows how zBang can help you identify potential privileged account vul...

Next Video
Start-to-Finish Demo: Building Scripts with REST API – Session 2
Start-to-Finish Demo: Building Scripts with REST API – Session 2

In this session, CyberArk’s Joe Garcia will show how to provision a local user on target machine and onboar...