Centrify Privileged Access Management:
Serving the Needs of DevOps
Today, many organizations face a dilemma. DevOps processes and cloud workloads expand the attack surface due to a massive increase in unprotected privileged IDs and passwords. While Privileged Access Management (PAM) security controls can help, traditional PAM is disruptive, impacting DevOps agility and its goal of accelerating application delivery. The result is DevOps teams build applications that prioritize functional requirements over security, which leaves organizations exposed to significant risk. Centrify’s modern PAM solutions reduce that risk through cloud-native security controls, CI/CD integrations, and 100% automation that finally gives PAM a seat at the DevOps table.
Secure DevOps Practices are Not the Priority
The introduction of microservices, container-based architectures, and modern DevOps practices has led to a revolution in software development. However, as companies adopt these new technologies, tools, and methodologies, managing privileged access becomes increasingly complex and disruptive.
Security and operations teams must now manage and audit permissions and credentials for a growing number of user and system accounts. Compounding the issue is that traditional methods of securing developer environments involve manual interventions and restrictive controls that significantly impact development and operational agility.
For most DevOps practitioners, enforcing secure DevOps practices is just a side job. Their focus is on writing code, fixing issues with build servers, diagnosing build failures, helping new developers with problems, and getting their environments set up.
Let Centrify Help
Secure DevOps is the concept of integrating security into every aspect of the DevOps-based software delivery process. Centrify modern PAM solutions enable customers to build and deploy applications securely, using DevOps practices. These solutions centralize and automate access controls for developer toolchains and underlying infrastructure, enhance application security, and enable logging and auditing of privileged activity.
With Centrify PAM, you can:
Centralize Privileged Access Management
With IT infrastructure, applications, and users being more distributed than ever, you need a modern PAM solution that can centralize the management of identities, credentials, secrets, roles, and rights to make your life easier. It must accommodate systems and workloads in virtual machines or containers in your data center, private cloud, public cloud, or multi-cloud. Centrify PAM solutions satisfy these requirements. 100% home-grown, they are fully integrated on top of a single cloud-native platform, avoiding complexities and inconsistencies that would otherwise trickle down to DevOps, disrupting agility.
Simplify user authentication against any directory source, including Active Directory, LDAP, Google Directory, or the Centrify Cloud Directory, without requiring directory line-of-sight. Users can log in to any system, anywhere, using their personal enterprise account. With Centrify multi-directory brokering, you don’t even need to join systems to your AD domain, replicate AD infrastructure, or use expensive site-to-site VPNs.
Control Privileged User Access
Allowing users to log in with superuser accounts exposes you to significant risks and violates many regulations and standards. Vault them away for emergency use only. Have users log in with their personal, low-privilege account that is fully accountable. Centrify host-based security ensures fine-grained access control at the shell and process level. A just-in-time access request and approval workflow ensures that users get only the permissions they need, when they need them, for a limited time. To further assure the user's identity, you can enforce Multi-Factor Authentication (MFA) to protect access to your developer toolchain, computing resources, and secrets stores.
Enhance Application Security
Accounts, passwords, and configuration data used by applications, containers, and microservices are a prime target for attackers. Instead of embedding them in plaintext files, securely vault and retrieve them programmatically via RESTful API or CLI calls. For more robust security, avoid passwords and obtain stronger ephemeral tokens such as SAML and OAuth2 from the Centrify Platform.
Shrink Your Attack Surface and Reduce Operational Overhead
To access credentials and secrets in the vault, applications and services need a vault service account with which to log in. Each service account carries overhead to create and assign roles and rights. It also represents a potential vector of attack, increasing your attack surface massively. Avoid per-application service accounts and instead leverage Centrify Delegated Machine Credentials, one per machine. Give trusted applications and services on that machine a scoped OAuth2 token with permission to access specific vault APIs.
Audit Privileged Activity
Automatically log, monitor, and audit administrative activity in your development and production environments.
With the strong growth of the HashiCorp community, having Vault integrate with Centrify PAM is a valuable option for our users. Centrify’s solution empowers users to leverage the control and flexibility of using their existing corporate source for identity while also increasing security and agility. That’s huge for developers, who are usually required to sacrifice one over the other., Vice President, Worldwide Alliances, HashiCorp