Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

How zero trust DevOps eliminates risk of unsanctioned cloud access

By Cliff Stanton
digital Trust freepik

Image via Freepik

November 29, 2022

Thanks to the rise of automation and cloud-based sandboxing, DevOps has become the norm in virtually every organization working with agile workflows for continuous rollouts. While DevOps offers tremendous advantages from a release and GTM perspective, security often lags. This is because many organizations still rely on Waterfall-based security workflows that are out of step with modern DevOps processes.


To fully realize the potential of DevOps, organizations must extend it further and embrace DevSecOps. While DevSecOps requires broad cultural buy-in, it also relies on a set of automated processes that continuously validate access credentials to ensure optimal security.


In short, DevSecOps is the easiest way to install zero trust security in your organization’s apps. A mindset that ideally informs every aspect of your cybersecurity posture, zero trust calls for providing both humans and machine “non-person entity” (NPE) identities access to resources only when needed and only to those who can verify that they need it.


With this in mind, zero trust represents the gold standard when it comes to contending with the DevOps-led app production landscape in today’s enterprise.


The Rise of Machine IDs

Security practices in many enterprises currently adhere to a bygone world where human beings were the primary entities accessing systems. The modern enterprise environment is very different from what it was a decade ago.


DevOps has pushed companies to embrace automation, and the number of tools used in the pipeline has increased exponentially. As a result, machines and NPEs access systems far more than humans. Add to this mix the rise of cloud storage and containerization, and the result is a sprawl of systems, secrets, and processes intermingling.


Manual cybersecurity practices have no hope of managing this landscape. Instead, as with DevOps principles, security teams must adopt automation wholeheartedly to deal with this sprawl. Rene Paap of Akeyless, a SaaS-based secrets management platform, notes that while machine IDs are numerous, their numbers fluctuate, creating even more challenges.


“Secrets are one of the most sensitive assets for an organization,” he writes. “To keep control over the ever-fluctuating amount of machine secrets, organizations must automate their lifecycle management — from creation to storage, to rotation, and eventually, to revocation.” 


Paap notes that most organizations store and manage NPE credentials and other secrets with a variety of solutions. For instance, some secrets might be buried in CSP vaults while others are hardcoded into production code to ease microservice access.


Given the complex interactions that fall under the scope of a modern DevOps pipeline, automating zero trust by accessing secrets dynamically makes the most sense. Organizations that continuously validate access credentials and generate certificates on an on-demand basis can rest assured their systems are protected against unauthorized breaches.


Just-in-Time (JIT) Security

Zero trust is a philosophy that informs several cybersecurity practices. At its core, zero trust assumes every entity asking for system access deserves suspicion, and most prove itself before entering your boundaries. Thanks to the rapid advances in attack methods, however, verifying access before entry doesn’t cut it.


A compromised entity might use fake credentials obtained via a vulnerability, compromising your system. Or worse, you might grant access to a genuine entity, only for its credentials to lapse, giving malicious actors an entry point into your systems.


The solution to these problems is just-in-time or JIT security. JIT offers entities access based on how often they use your system and how long they need to access information. At its core, JIT embodies zero trust principles by giving entities only the access they need and nothing else.


For instance, a microservice that retrieves data from a database container during an end-of-day batch process does not need continuous access. JIT access systems help you create credentials that are active for short periods, limiting the possibility of major damage or lapsed credentials.


You might argue that such a process adopts a highly cynical view of our digital world. David Holmes, Senior Research Analyst at Forrester, points out that this view is reality, as cynical as it might seem. “The internet was designed without security in mind,” he says. “We’ve allowed it to become a toxic, malicious hive of scum and villainy.”


Holmes argues that patching band-aids on top of every security concern has to stop, and organizations must rethink their security philosophy from the ground up.


Seamless System Linkages

Configuration errors and system endpoints offer malicious entities an entry point into enterprise systems. For instance, one system in the network might receive an upgrade that puts it out of sync with the rest of your network. This situation creates configuration errors that malicious actors can leverage.


The zero trust philosophy aligns with DevOps’s streamlined vision of development workflows. Thanks to automation and APIs, zero trust tools can often integrate with your existing infrastructure seamlessly, minimizing infrastructure changes and disruption. 


Writing for Aberdeen Research, Thomas MacIsaac, a VP for SSH Communications Security, explains that “Fortunately, frictionless privileged access solutions have been developed that balance both the need for speed and the need to be secure.” 


What’s more, he continues, “The only way forward is to permanently remove unmanaged keys and get rid of passwords from SysAdmin access to cloud and server environments. Monitoring, provisioning, and maintenance must all be simplified, and everything access-related should be automated.”


This streamlined secrets management vision minimizes the possibility of systems falling out of sync and creating new attack vectors. The result is seamless security integration into your DevOps pipeline.


Zero Trust Is the Way Forward

Zero trust might seem complex to install at first due to its radically different approach from prevalent security protocols. However, zero trust aligns with modern DevOps cycles, giving you a robust DevSecOps posture that helps you combat and counter threats.


While organizations must install a culture of DevSecOps to realize all of zero trust’s benefits, technology and automation do not pose any hurdles to implementing these principles.

KEYWORDS: cyber security DevOps risk management zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cliff Stanton is an IT advisor, specializing in cybersecurity and databases.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    5 phases of zero trust in cloud adoption

    See More
  • biometrics-freepik1170x658v8502.jpg

    Biometrics as a foundation of zero trust: How do we get there?

    See More
  • Man working on laptop computer

    Zero trust and the role of least privilege for securing cloud workloads

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!