For DevSecOps, there’s always a balancing act between the fast pace of development velocity and security. Developers want to move…
Category: Secrets Management
Kubernetes Security: Best Practices for Kubernetes Secrets Management
Kubernetes has come a long way since its inception. But as the adoption of containerization has grown, Kubernetes security continues…
Technical Deep Dive: Using Conjur Secrets in VM-Deployed Ansible Tower Applications
Secrets management assists organizations in authenticating applications and checking clients before allowing them to access sensitive information, systems, and services….
Security Automation with Red Hat Ansible Tower Introduction
No matter their occupation, nobody likes to do the same set of tasks repetitively — especially when automation is an…
Setting up Conjur on OpenShift
Red Hat OpenShift is a Kubernetes-based platform for container orchestration. OpenShift differentiates itself from Kubernetes through features such as tight…
Installing Conjur in an EKS Kubernetes Cluster Using Rancher
By default, Kubernetes uses Base64 encoding to store information such as application credentials, keys, and certificates. Unfortunately, this Base64 encoding…
Conjur Secrets Management in Knative Serverless Functions
Knative is the de facto standard for running serverless workloads in Kubernetes. But what do you do when your Knative…
New Red Hat OpenShift Secrets Management Operator for The Conjur (Follower)
Red Hat OpenShift is one of the most popular and powerful enterprise container orchestration platforms. All container orchestration solutions let…
Low-Code Secrets Management For Beginners
In recent years, there is a trend toward so-called low-code and no-code platforms. While no-code platforms often appeal to businesses…
Remove Secrets from your Codebase
With technology becoming a central part of our daily lives, we need to keep information safe from an equally rapidly…
IoT and Edge Secrets Management with Conjur and K3s
Editor’s Note: Please be aware that K3 is not officially supported on Conjur and the contents of this tutorial are…
Why Machine Identity is as Important as User Identity to Infrastructure Security
Cloud-native applications use resources available to them online, on a public cloud platform, or hosted on-premises. IT teams apply policies…
Three Steps to Avoiding the Secret Zero Trap
Most secrets management solutions rely on a master key or “secret zero” that can unlock other credentials. The problem is…
Adding Conjur Secrets Management to Your Jenkins Pipeline
The first article in this series discussed the value of integrating Conjur with Jenkins. This article focuses on implementing Conjur…
Keeping Secrets Secure on Kubernetes
Handling secrets in cloud-native environments is a challenge for many organizations. Virtually any application requires some sort of secret, such…
Why You Need Secrets Management in Your Jenkins Pipeline
Jenkins is a versatile platform for implementing continuous integration and continuous delivery (CI/CD) processes to develop applications. Using plugins, Jenkins…
Kubernetes secrets management: Build secure apps faster without secrets
Kubernetes is a popular choice for microservices because it provides scalable, portable, efficient deployment and reduces most DevOps overhead. Generally,…
Managing Secrets for Cloud Infrastructure Tools Like Terraform
Managing cloud infrastructure isn’t a simple task at the best of times. From initial provisioning and configuration to maintenance and…
Secrets Management Deployment Tips & Tricks
Conjur provides excellent policy and command examples. The Getting Started with Conjur guides and Conjur Documentation should be your first…
Community Perspective: Managing Secrets for Puppet Automation
DevOps teams rely heavily on their CI/CD configuration tools to automate processes, accelerate delivery timelines and innovate at high velocity….
DevOps Security: Cloud Secrets Management, from Multi-Cloud to Cloud Agnostic Environments
Organizations are migrating and deploying new workloads in cloud environments much more rapidly than ever, instead of expanding traditional on-premises…
Learning Secrets Management With Hands-on Interactive Tutorials
Learning is fun, and the best way to learn is through hands-on exercises. That’s why Conjur provides some tutorials to…
Introducing the Conjur OpenAPI Description
The Conjur REST API is now available as an open-source OpenAPI definition. This effort creates new avenues for API exploration,…
Essentials to Securing Kubernetes Secrets with Secrets Management
Secret management is essential for ensuring an organization’s cybersecurity. In this era, when users share valuable information with service providers,…
How to Setup Serverless IAM Authenticator with AWS Lambda
Lambda functions are a great way to build a microservices application without the need to provision or manage servers. You…
Secrets Management RBAC Policy Example
Conjur controls access to secrets using role-based access control (RBAC). We cover this in detail in Policy Concepts, but, to…
Security Considerations for Data Stream Processing
In today’s day and age, it’s hard to overstate the importance of data. Every day organizations throughout the world build…
Secrets Management for Hybrid Applications
Keeping secrets safe is quite an important aspect of managing an application. One that is often ignored until it’s too…
Securing OpenShift Secrets
Almost every application needs to deal with secrets in one way or another, to authenticate with a backend database or…
Secret Zero: Eliminating the Ultimate Secret
Centralized secrets management addresses important DevOps security attack vectors such as secret sprawl and security islands, but it could help introduce…
Secrets Management with .NET Core
Since the earliest attempts at application development, programmers have needed to include credentials as part of their application. Connecting an…
Application Security: Best Practices for Secrets Management to Protect Applications
Application Security Overview Good application security (AppSec) prevents unauthorized access and modifications to apps by controlling access to sensitive information…
Security Automation: How Secrets Management Supports Test Automation
One concept that doesn’t always come to mind when we think of automated application testing is secrets management. That being…
Cloud Native IAM EKS Secrets Management for Kubernetes
Kubernetes is a great orchestration tool for your containerized applications and Amazon’s Elastic Kubernetes Service (EKS) provides an easy way…
Application Security and Machine Learning
Application architecture hasn’t really changed all that much over the last 50 years. While we have gone from client-server to…
Secrets Management Considerations for a Post-Quantum World
How will quantum computing change secrets management? That seems like a pertinent question to ask, now that Google has claimed…
Puppet Secrets Management: Key Conjur v3 Enhancements
After much hard work, our team is pleased to announce the release of our new v3 of CyberArk/Conjur Puppet module…
Stateless Application Secrets
The technology world has always relied heavily upon applications with some form of state, especially during the previous era of…
Leverage Secrets Management for Effective On-Call Support
In many ways, on-call duty and secrets management might seem to occupy pretty different parts of the IT universe. When…
Understanding Secrets Management, OAuth, and Single Sign-On (SSO)
Once upon a time, access management was a simple thing. It focused mostly on making sure that the right users…
Connect to Any API Without Exposing Your Secrets | Secretless Broker
What is Secretless? Connecting to APIs has become a standard part of application development. As developers, we regularly use APIs…
Enforcement at scale with Admission Controllers with Secrets Management
The ability to consume external resources “on-the-fly,” is a core capability of cloud-native architecture, one that comes with a prerequisite…
Service-to-Service Authentication in Cloud Applications & Microservices
It’s not an exaggeration to say that enterprise ready machine identity frameworks are in greater need than before. This is…
Managing Secrets For Concourse CI Pipelines
One of the most important aspects of today’s cloud infrastructures is secrets management. There are many possible solutions, all of…
AWS IAM Authenticator Tutorial For Conjur Open Source
Applications often need to hold secrets. Connection strings, passwords, certificates, and other credentials are among the information applications may need…
Secrets Management Overview For Developers & DevOps
Secrets management is a critical problem for developers, especially for teams adopting DevOps practices. Until recently, it was the IT…
Secrets Management Best Practices for Machines and Services to Get Secure Access
When we talk about Secrets Management and handling secrets, we ought to think about all the users of the system…
Developer’s Guide to Selecting a Secrets Management Solution
The role of the developer has changed a great deal in recent years. Application architectures now include microservices, distributed systems,…
How to Build Your Secrets Management REST API’s into Postman
Machine-to-machine communication is very important in today’s business-in-the-cloud. A lot of credentials and secrets are used and shared by non-human…
How to Scan GitHub Repositories for Secrets & Credentials with Open Source
Some GitHub repositories don’t just contain code – they contain passwords, API tokens, and credentials. The worst part? These are…
Managing Secrets Successfully in a Cloud-Native World
We’re living in a cloud-native world, and the tools and strategies that worked in the pre-cloud era often no longer…
What is Secrets Sprawl & How to Avoid It with Secrets Management
Secrets sprawl, as the name suggests will grow out of control and become a tangled mess when it is not…
Tutorial: Sharing Credentials Across Multi-cloud with Centralized Secrets Management
As organizations of all cuts and sizes are migrating to the cloud, there is a need to risk-assess the outcomes…
Tutorial: How I Secured Third-party Mongo API Secrets in My Node.js App Across the Cloud
Developing modern web applications in the cloud nowadays is more streamlined than ever. This is true because many external vendors…
An Introduction to Creating & Organizing Your First Public Key Store for Microservices With Secrets Management
Microservices are taking the world by storm, and the movement isn’t showing signs of slowing down any time soon. The…
Building a Comprehensive Monitoring Strategy That Includes Secrets Management
Over the past decade, software development and information technology operations have become more integrated, spawning a new approach, commonly called…
Four Ways to Keep Kubernetes’ Secrets Secret
We have talked a lot about the speed at which DevOps innovation has moved and how security has consistently struggled…