CyberArk Conjur Added as a Key Security Element of the “Periodic Table of DevOps Tools”

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

DevOps tools are being released at record pace, and keeping up with the latest – and most effective – can be challenging. The “Periodic Table of DevOps Tools” is an excellent go-to reference to help IT professionals navigate the expanding market. XebiaLabs this week published an updated version of the resource – and spotlights CyberArk Conjur (element CK, number 118) as an integral security tool.

Available as an open source tool and for the enterprise, CyberArk Conjur is a secrets management solution tailored specifically for the evolving infrastructure requirements of native cloud and DevOps environments. The solution incorporates fundamental DevOps security principles, such as least privilege and segregation of duties, to secure and manage secrets used by non-human machine identities—from CI/CD tools to containers to applications to microservices—as well as human users throughout the DevOps pipeline.

CyberArk Conjur integrates with leading DevOps tools including Ansible, Jenkins, Docker, Chef and Puppet, enabling these tools to access and use secrets and credentials managed by CyberArk Conjur. In addition, CyberArk Conjur integrates with the leading platform-as-a-service (PaaS) solutions, including Red Hat OpenShift, Kubernetes (K8S), Pivotal Cloud Foundry (PCF) and Cloud Foundry (CF).

Note:  Some integrations are currently only available for CyberArk Conjur Enterprise, see here for details.

With CyberArk Conjur, secrets and credentials can be consistently managed across DevOps environments regardless of the secrets management capabilities of the native DevOps tools or platforms, which can vary significantly and are not always enterprise ready. For example, some native tools are missing critical credential rotation and audit capabilities. Importantly, this solution eliminates “islands of security” created when individual DevOps tools cannot securely share secrets with each other.

Try the Hosted Tutorial for CyberArk Conjur Open Source

It’s easy to get started. Check out the CyberArk Conjur Open Source-hosted tutorial for a tour of core secrets management concepts such as storing and fetching secrets, machine authentication and authorization and security policy as code. This is a hosted version of the Conjur Open Source, so as you get started, you’ll be asked to answer a few basic questions before you get your API key.  If you need help or would like to chat with your peers, join our Slack community.

 

 

The post CyberArk Conjur Added as a Key Security Element of the “Periodic Table of DevOps Tools” appeared first on CyberArk.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
982 Followers
About CyberArk
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Promoted Content
7 COMMON PRACTICES THAT MAKE YOUR ENTERPRISE VULNERABLE TO A CYBER ATTACK
Advanced cyber attacks involve compromised privileged accounts. Cyber attackers target them because they represent the keys to the IT kingdom. Effective enterprise security includes proactively protecting privileged accounts. Industry experts have identified practices that increase an organization’s vulnerability to a cyber attack. How many of these are common at your organization?

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel