Secrets Management Takes More Than Just Tools
Can you just purchase a tool to give you a good security posture? Discover how People, Processes, and Tools elevate code security to protect against data breaches.
Join the DZone community and get the full member experience.
Join For FreeEvery company wants to have a good security posture, and most are investing in security tooling. According to Gartner, worldwide spending on security is forecast to grow 11.3% in 2023 to reach more than $188.3 billion.
However, despite all this spending, there are certain areas where problems are only getting worse, such as secrets sprawl. Reports now say over 50% of cyber attackers gained their initial foothold by exploiting compromised credentials. No organization wants to go through an indecent like Samsung or Nvidia or repeat Uber's unfortunate experience.
So what can we do? First, we must admit that secret management tools alone can not save the day.
A Good Lock Alone Is No Guarantee of Security
An intricate deadbolt on your front door serves little purpose if the door is carelessly left ajar. Even the sturdiest lock is ineffective if someone neglects to lock it or leaves the key lying around.
Good secrets management requires three fundamental pillars:
- People: Kept aware of the issues and properly trained on the tooling and processes.
- Processes: Clear documented procedures for creating, storing, accessing, and rotating secrets.
- Tools: Credentials storage and management, as well as detection and leak remediation.
People Need Training To Use Tools and Fix Issues
Each security challenge involves a human dimension. If your team lacks awareness regarding the specific security issues being addressed and how to leverage the security tools available, then it is unlikely your security posture will improve.
There are two major components to keep in mind when thinking about education:
- Awareness: Explain the issue, what risks it brings, and what can be done to address it.
- Training: How to use the specific tools that are available to solve the issue.
These components are the "why" and the "how" which are both needed for success. If you explain the problem but present no solutions, all you do is make people anxious. If you only list a set of 'how-tos' for any tool without explaining the larger context, you will not likely get the tool used at the right time or at all. It is critical to get everyone on the same page, especially across team boundaries throughout your organization.
Raising awareness across all teams is at the heart of many security champion programs. OWASP has published a free Security Champion Playbook that can get you started, and we would also recommend checking out Snyk's Security Champions guide. You can hear more about security champions from Tanya Janca on The Security Repo Podcast.
Consistent Processes Make For Consistent Results
Achieving better security relies on the establishment and communication of good procedures. No matter the task, there likely exists a recommended and secure method to accomplish it that everyone should be following.
Using a whiteboard to create flowcharts can be a great way to think through processes. If you turn these charts into Kanban or flow diagrams, they can be an excellent basis for written procedures, too. No matter how you create or think of your processes, they are only good if you effectively communicate them, meaning good documentation and training.
Consistency Is Vital for Any Tool
Of course, you need tools to get the job done, but tools require proper and consistent usage for reliable results.
For example, Secrets managers are the bedrock of secret management strategies. Technologies such as Vault by HashiCorp or Doppler or platform-based vault systems like Azure Key Vault or AWS Secrets Manager bring extensive benefits. Those benefits only become available when an org uses them consistently. Developers who implemented their own separate secrets managers, away from the security team's oversight, or who rely entirely on `.env` files are inviting issues.
Just as important as storage is secret detection. The act of running a scan alone does not do much. Executing an action plan once an incident is identified is vital. Having a spreadsheet of results you will get around to dealing with someday means you are not likely going to put a stop to this issue.
Tools, People, and Processes Determine Your Security Posture
Achieving a good security posture extends beyond the acquisition of tools alone.
While secrets sprawl remains a persistent challenge, the good news is that with a holistic approach, we can all get there. Good security thrives on three core pillars: People, Processes, and Tools. These components work in concert to fortify an organization's security posture.
Published at DZone with permission of Dwayne McDaniel. See the original article here.
Opinions expressed by DZone contributors are their own.
Comments