Spartak - Fotolia
I am all for DevOps to develop and deploy applications faster, but how can we protect the cryptographic and digital keys throughout the application lifecycle?
DevOps application lifecycle management consists of two parts. In the first part, the developers build and test an application for coding errors. In the second part, the production operators deploy and monitor the application. If the application doesn't run properly, the production operators and the developers collaborate to fix the problems. The lifecycle repeats until the application runs in live production.
One flaw of this DevOps application lifecycle management approach is that cryptographic security risks that may have been ignored in the development or test production stage can roll over to live production systems.
Risk management analysts and security experts are not part of the standard DevOps team. Risk management analysts assess risks and determine security controls in each DevOps lifecycle stage. Security experts determine what cost-effective security tools (automatic and manual) can be used to mitigate the risks.
A study about cryptographic security and DevOps application lifecycle management from Dimensional Research reveals that 89% of organizations with mature DevOps practices are aware of the security controls needed to protect themselves from attacks. In organizations adopting DevOps, only 56% are aware of these controls.
Tools are needed to prevent attackers from successfully hacking DevOps keys and certificates. The attackers can hide in encrypted traffic to avoid detection.
According to a report from A10 Networks, 41% of cyberattacks used encryption to evade detection.
To protect cryptographic and digital keys, here are the steps you should follow:
- Develop a plan for each lifecycle stage.
- Consider application changes from on premises to cloud.
- Expand your DevOps team to include risk management analysts and security professionals.
- Develop an effective awareness program.
- Build a DevOps toolkit to prevent cryptographic and digital attacks.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Check out some application lifecycle management best practices for advanced DevOps organizations
Read about how corporate culture influences the selection of the best application lifecycle management tools
Find out why application lifecycle management needs a unified DevOps approach
Dig Deeper on Application and platform security
Related Q&A from Judith Myerson
Not every enterprise needs the functionality of a standard VPN client. A site-to-site VPN may be a better choice for some companies, but it's not ... Continue Reading
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading