DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Related

  • Remote Work Security Tips for Developers
  • What Is Compliance Monitoring for Remote Developers?
  • Fueling the Future: How Tech Funding Empowers IT Consultants in AI/ML and Cybersecurity
  • Four Ways for Developers To Limit Liability as Software Liability Laws Seem Poised for Change

Trending

  • Role-Based Multi-Factor Authentication
  • Implementing CI/CD Pipelines With Jenkins and Docker
  • The Rise of the Platform Engineer: How to Deal With the Increasing Complexity of Software
  • Behavior-Driven Development (BDD) Framework for Terraform
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Secrets Management Takes More Than Just Tools

Secrets Management Takes More Than Just Tools

Can you just purchase a tool to give you a good security posture? Discover how People, Processes, and Tools elevate code security to protect against data breaches.

By 
Dwayne McDaniel user avatar
Dwayne McDaniel
·
Nov. 03, 23 · Opinion
Like (2)
Save
Tweet
Share
3.5K Views

Join the DZone community and get the full member experience.

Join For Free

Every company wants to have a good security posture, and most are investing in security tooling. According to Gartner, worldwide spending on security is forecast to grow 11.3% in 2023 to reach more than $188.3 billion. 

However, despite all this spending, there are certain areas where problems are only getting worse, such as secrets sprawl. Reports now say over 50% of cyber attackers gained their initial foothold by exploiting compromised credentials. No organization wants to go through an indecent like Samsung or Nvidia or repeat Uber's unfortunate experience. 

So what can we do? First, we must admit that secret management tools alone can not save the day. 

A Good Lock Alone Is No Guarantee of Security

An intricate deadbolt on your front door serves little purpose if the door is carelessly left ajar. Even the sturdiest lock is ineffective if someone neglects to lock it or leaves the key lying around. 

Good secrets management requires three fundamental pillars:

  • People: Kept aware of the issues and properly trained on the tooling and processes.
  • Processes: Clear documented procedures for creating, storing, accessing, and rotating secrets.
  • Tools: Credentials storage and management, as well as detection and leak remediation. 

People Need Training To Use Tools and Fix Issues

Each security challenge involves a human dimension. If your team lacks awareness regarding the specific security issues being addressed and how to leverage the security tools available, then it is unlikely your security posture will improve.

There are two major components to keep in mind when thinking about education:

  • Awareness: Explain the issue, what risks it brings, and what can be done to address it.
  • Training: How to use the specific tools that are available to solve the issue.

These components are the "why" and the "how" which are both needed for success. If you explain the problem but present no solutions, all you do is make people anxious. If you only list a set of 'how-tos' for any tool without explaining the larger context, you will not likely get the tool used at the right time or at all. It is critical to get everyone on the same page, especially across team boundaries throughout your organization. 

Raising awareness across all teams is at the heart of many security champion programs. OWASP has published a free Security Champion Playbook that can get you started, and we would also recommend checking out Snyk's Security Champions guide. You can hear more about security champions from Tanya Janca on The Security Repo Podcast. 

Consistent Processes Make For Consistent Results

Achieving better security relies on the establishment and communication of good procedures. No matter the task, there likely exists a recommended and secure method to accomplish it that everyone should be following.

Using a whiteboard to create flowcharts can be a great way to think through processes. If you turn these charts into Kanban or flow diagrams, they can be an excellent basis for written procedures, too. No matter how you create or think of your processes, they are only good if you effectively communicate them, meaning good documentation and training.

Consistency Is Vital for Any Tool

Of course, you need tools to get the job done, but tools require proper and consistent usage for reliable results.

For example, Secrets managers are the bedrock of secret management strategies. Technologies such as Vault by HashiCorp or Doppler or platform-based vault systems like Azure Key Vault or AWS Secrets Manager bring extensive benefits. Those benefits only become available when an org uses them consistently. Developers who implemented their own separate secrets managers, away from the security team's oversight, or who rely entirely on `.env` files are inviting issues.

Just as important as storage is secret detection. The act of running a scan alone does not do much. Executing an action plan once an incident is identified is vital. Having a spreadsheet of results you will get around to dealing with someday means you are not likely going to put a stop to this issue. 

Tools, People, and Processes Determine Your Security Posture

Achieving a good security posture extends beyond the acquisition of tools alone.

While secrets sprawl remains a persistent challenge, the good news is that with a holistic approach, we can all get there. Good security thrives on three core pillars: People, Processes, and Tools. These components work in concert to fortify an organization's security posture.

 People + Processes + Tools make good security.


career security

Published at DZone with permission of Dwayne McDaniel. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Remote Work Security Tips for Developers
  • What Is Compliance Monitoring for Remote Developers?
  • Fueling the Future: How Tech Funding Empowers IT Consultants in AI/ML and Cybersecurity
  • Four Ways for Developers To Limit Liability as Software Liability Laws Seem Poised for Change

Partner Resources


Comments

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: