CyberArk Conjur Open Source is Now Available on AWS Marketplace

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

We’re excited to announce that CyberArk Conjur Open Source is now available as an AMI (Amazon Machine Image) on Amazon Web Services (AWS) Marketplace. Conjur Open Source is a powerful secrets management solution tailored specifically to the unique infrastructure requirements of native cloud, container and DevOps environments.

The availability of Conjur Open Source further expands CyberArk’s offering on AWS Marketplace, which already includes the CyberArk Privileged Access Security Solution.

Integration with AWS IAM Improves Security

Conjur offers powerful integrations with AWS. For example, Conjur can improve AWS workload security by utilizing the native capabilities of AWS Identity and Access Management (IAM) roles for strong authentication and Conjur for policy-based authorization. Since Conjur-defined policies can be applied to pre-defined AWS IAM roles, this approach enables developers and security teams to avoid redoing work, which can slow down the development process. Conjur can authenticate to any of the AWS Principles, including AWS Elastic Compute Cloud (EC2), AWS Elastic Container Service (ECS) instances and AWS Auto Scaling and Lambda functions. As a result, organizations using both AWS and CyberArk can manage access policies more securely across AWS, hybrid, multi-cloud and CI/CD pipelines.

Centralized Solution that Avoids the Limitations of Native Platforms and Tools

Conjur is designed to provide a centralized solution for secrets management, which helps developers to easily and consistently protect secrets, keys, certificates, and authentication data across the CI/CD pipeline, regardless of the varying capabilities of the underlying native tools and environments. Conjur Open Source integrates natively with leading container environments and native tools, including Kubernetes, Red Hat OpenShift and Cloud Foundry, as well as Jenkins, Chef, Puppet and Ansible.

Conjur was designed with ease of use for developers in mind. Its capabilities include machine identity, and policy as code, as well as powerful security features, such as centralized policy-based enforcement, segregation of duties, rotation and monitoring.

Easy to Start Securing Secrets

Conjur Open Source on AWS Marketplace gives developers an easy way to use Conjur to get hands-on experience removing and securing secrets from their code. For example, Conjur lets developers automatically secure secrets in code that uses environmental variables.

Flexible Upgrade to Enterprise-Class Capabilities

Conjur Open Source can be easily upgraded to Conjur Enterprise, which provides all the capabilities of Conjur Open Source plus full access to CyberArk support and can be integrated with the CyberArk Vault. Vault integration allows secrets and credentials managed by the CyberArk Vault to be automatically on-boarded to platforms integrated with Conjur, such as containers managed by Red Hat OpenShift or a Jenkins pipeline, enabling centralized policy-based rotation and audit across the enterprise.

Next Steps

Conjur Open Source is also available as a Kubernetes application on Google Cloud as well as on GitHub and other sites. For more information and tutorials on Conjur Open Source, visit Conjur.org and, for Conjur Enterprise, visit Cyberark.com/Conjur or contact CyberArk Sales.

To learn more about CyberArk support for the AWS community, visit https://www.Cyberark.com/aws/.

The post CyberArk Conjur Open Source is Now Available on AWS Marketplace appeared first on CyberArk.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
986 Followers
About CyberArk
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to lock down privileged accounts and protect against cyber threats before attacks can escalate and do irreparable business damage. CyberArk is trusted by the world’s leading companies – including more than 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications, while ensuring tight regulatory compliance and audit requirements.
Promoted Content
7 COMMON PRACTICES THAT MAKE YOUR ENTERPRISE VULNERABLE TO A CYBER ATTACK
Advanced cyber attacks involve compromised privileged accounts. Cyber attackers target them because they represent the keys to the IT kingdom. Effective enterprise security includes proactively protecting privileged accounts. Industry experts have identified practices that increase an organization’s vulnerability to a cyber attack. How many of these are common at your organization?

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel