I am all for DevOps to develop and deploy applications faster, but how can we protect the cryptographic and digital...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
keys throughout the application lifecycle?
DevOps application lifecycle management consists of two parts. In the first part, the developers build and test an application for coding errors. In the second part, the production operators deploy and monitor the application. If the application doesn't run properly, the production operators and the developers collaborate to fix the problems. The lifecycle repeats until the application runs in live production.
One flaw of this DevOps application lifecycle management approach is that cryptographic security risks that may have been ignored in the development or test production stage can roll over to live production systems.
Risk management analysts and security experts are not part of the standard DevOps team. Risk management analysts assess risks and determine security controls in each DevOps lifecycle stage. Security experts determine what cost-effective security tools (automatic and manual) can be used to mitigate the risks.
A study about cryptographic security and DevOps application lifecycle management from Dimensional Research reveals that 89% of organizations with mature DevOps practices are aware of the security controls needed to protect themselves from attacks. In organizations adopting DevOps, only 56% are aware of these controls.
Tools are needed to prevent attackers from successfully hacking DevOps keys and certificates. The attackers can hide in encrypted traffic to avoid detection.
To protect cryptographic and digital keys, here are the steps you should follow:
- Develop a plan for each lifecycle stage.
- Consider application changes from on premises to cloud.
- Expand your DevOps team to include risk management analysts and security professionals.
- Develop an effective awareness program.
- Build a DevOps toolkit to prevent cryptographic and digital attacks.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Check out some application lifecycle management best practices for advanced DevOps organizations
Read about how corporate culture influences the selection of the best application lifecycle management tools
Find out why application lifecycle management needs a unified DevOps approach
Dig Deeper on Secure software development
Related Q&A from Judith Myerson
The upcoming Windows update, Redstone 3, will patch the vulnerability that enables EternalBlue exploits. Expert Judith Myerson discusses protection ...continue reading
CrashOverride malware targets industrial control systems and can wreak havoc. Expert Judith Myerson explains the capabilities of the malware and what...continue reading
Using SNMP v3 is a good first step, but it's not enough to prevent attackers from accessing a network through an SNMP-enabled device. Expert Judith ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.