how-to-choose-secrets-management-solution-wp
how-to-choose-secrets-management-solution-wp
How to
Choose a
Secrets
Management
Solution
cpl.thalesgroup.com
Table of Contents
Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Sprawled everywhere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Mission critical. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Siloed solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Secure access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5. Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
6. Multi-environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
8. Governance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
About Thales. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Secrets like passwords, API keys, SSH keys and encryption certificates enable services,
applications, and systems to communicate securely. However, uncontrolled sprawl also
introduces security risks, with many high-profile breaches tied to compromised secrets.
This white paper examines the urgent need for robust secrets management solutions.
It provides a detailed overview of the secrets management challenge, from risks to
requirements. Guidance is provided on planning, evaluating, and selecting a secrets
management system aligned to organization needs.
Why is secrets management needed?
Secrets are credentials, certificates and keys used to authenticate between different machines or from human to machine interaction. Automated
processes, virtual machines and any process that runs a service needs to have access to that resource for authentication using credentials,
certificates, and keys.
Several trends in the last few years such as containerization, cloud transformation, DevOps, and automation contributed to a massive increase in the
number of secrets that are being used everywhere, in every environment including hybrid cloud, on-prem, and multi-cloud environments (Figure 1).
With this proliferation, stronger management is needed, otherwise, it can cause a lot of breaches such as Uber, Scotiabank, and Nvidia. With all
kinds of examples in the last few years, attackers gain access to environments using stolen secrets. Your secrets are in danger of compromising the
entire network by having them within the attack vector and elevating the privileges during that kind of attack resulting in a data breach.
To do this, the application would need to leverage a connectivity layer. That could be plugins, APIs, Command Line Interface, or SDK for the
application to connect to the secrets management system. It fetches the secrets to use them whenever the application needs to authenticate to a
third-party service, database, or other application. And eventually in memory, those secrets will be destroyed and will be eliminated. Whenever the
secret is not being used, it will not be stored within the application itself (Figure 2).
2. Multi-platform rotation capabilities However, supporting complex policies is also required. For example,
Having a rotation capability requirement allows you to reduce you may need a rotation to happen at 2 am, once every 30 days or
the risk of someone compromising that credential. If they obtain every hour. Policies are required for a secrets management solution to
that credential, then by automatically and periodically rotating provide and enable setting the time and the frequency for that rotation.
that password, the compromised password would be completely
meaningless. The password itself can be rotated by any automated
process by your secrets management system. Now understanding
3. Temporary Just-in-Time secrets
the rotation mechanism, it is particularly important for a secrets Support of static secrets and the ability to rotate them are important,
management system to be able to rotate different types of passwords but those kinds of credentials are just there, static and waiting to
on diverse types of platforms. There are a lot of technologies out there be compromised. This is the classic or traditional way of creating
that need wide support. For example, diverse types of databases identities. However, there is a mechanism that helps to elevate
need the ability to rotate SSH key, API key or rotate anything that you to a more advanced security practice when adopting secrets
have within your environment using a custom rotator. management. Temporary secrets, also known as Just-in-Time access,
should be considered as a requirement.
Government access
You must also consider whether you are concerned about government
access. If so, you must ensure that the secrets management solution
you choose prevents the government from accessing your secrets.
5. Connectivity
Another fundamental requirement is connectivity. Some repositories
may be secured with several types of secrets. How would a certain
workload be able to interconnect with the secrets management
system? There are several methods for this such as a SDK if it is a
source code that requires a particular secret, command line interface
if it needs to be injected within scripts, or an API to be etched.
Figure 4: Just-in-Time access
4. Secure access
Considering who can access your secrets and what they can do once
inside your secrets management system is another requirement. This
can have several layers.
Authentication
The first layer is who should be able to authenticate your secrets
management system. There are many identities such as micro functions,
team members, workloads. No matter the type of identity, you need to
set the identity to be able to authenticate. Figure 5: Many required plugins
Role-based access control (RBAC) Even more importantly is connectivity via plugins if leveraging an
automation platform like Jenkins, CircleCI, Ansible, Chef, Puppet, or
You need to set the exact identity permissions allowing that identity others. They all require a plugin to fetch the secrets when used. It is
permission to edit or create a certain secret. Or another identity could important that these tools be able to call for secrets from a secrets
have the permission to delete a particular secret. This flexibility is management system (Figure 5).
required.
Another type of connectivity consideration is support for a rich user
interface. A rich UI helps to understand what is happening and
provides a great user experience as well.
How to Choose a Secrets Management Solution White Paper 8
6. Multi-environment 8. Governance
Where do you need your secrets to be available? Usually, The last fundamental requirement is around governance.
the response is everywhere. Another requirement for a secrets
management system is that it must support different regions and Tracking
different environments – on prem, hybrid or multi-cloud. The system
When a workload is asking for a secret, it needs to capture
must replicate and sync secrets globally across all environments
comprehensive audit trails and logs of all secret access and
for development, test, staging, production in multiple regions and
administrative actions.
clouds. One hurdle is that organizations are dynamic. A secrets
management solution needs to seamlessly support the dynamic nature
of environments that are spinning up or down. Visibility
Next is visibility. Once all the secrets actions are tracked, those actions
must be presented on a reasonable dashboard allowing visibility of
what has happened with what kind of secret and who has accessed
them as well as isolate any identity that affects those secrets.
Redundancy
The second consideration is redundancy. What happens when it is A simplified process of migration for a new secrets management
not available? For example, you can leverage caching mechanisms. enterprise-wide solution is necessary. For those siloed solutions that
There are many solutions where a secrets management solution needs will not be migrated, visibility and an understanding of where those
to make sure that you have the full redundancy whenever needed. secrets are is crucial.
Scale
A third consideration is scale. When all those workloads work
together and operate simultaneously, they are requesting for those
secrets altogether. The operation of the secrets management system
needs to handle all those requests concurrently.
Summary
Today’s cloud-native, DevOps environments demand solutions to control secrets sprawl, enforce least privilege access, maintain availability, and
reduce attack surfaces. Unmanaged secrets introduce unacceptable cyber risks and hinder operations.
This white paper provided a comprehensive overview of the secrets management challenge, from risks to requirements. Organizations must align
their strategies to these realities, evaluating their needs against these criteria when selecting a secrets management platform.
With robust and proactive secrets management, enterprises can securely enable cloud transformation, automation, and innovation through
centralized secrets orchestration. Taming secrets sprawl provides multifaceted benefits from reduced breaches to simplified
IT architecture.
Resources
At Thales, we provide a unified data security platform that simplifies the management of access, data discovery, data protection, and control of
your most critical data and critical information. See how Thales CipherTrust Secrets Management is a state-of-the-art secrets management solution
powered by Akeyless. It meets these requirements and overcomes the challenges by protecting and automating access to secrets across DevOps
tools and cloud workloads including secrets, credentials, certificates, API keys, and tokens.
About Thales
Today’s businesses and governments depend on the cloud, data
and software to deliver trusted digital services. That is why the
most recognized brands and organizations around the world, rely
on Thales to help them protect sensitive information and software
wherever it is created, stored or accessed – from the cloud and
data centers to devices and across networks. As the global leader
in data security, identity & access management, and software
licensing, our solutions enable organizations to move to the cloud
securely, achieve compliance with confidence, create more value
from their software and deliver seamless digital experiences for
millions of consumers every day.
Contact us
For all office locations and contact information,
please visit cpl.thalesgroup.com/contact-us
cpl.thalesgroup.com