Title: AWS re:Inforce 2024 - Security lifecycle management in a multicloud world (APS222-S)
Insights:
- Primary Concern in Cloud Security: The biggest concern among IT professionals and cloud security leaders is leaked credentials, surpassing data theft and other breaches.
- Credential Breaches Statistics: According to a Verizon study, 90% of web application breaches result from stolen credentials, with a 400% increase in such breaches over the past two years.
- HashiCorp's Approach: The approach to security lifecycle management is summarized as Protect, Inspect, and Connect.
- Protect: Centralizing credentials and secrets, reducing risk through secret rotation, dynamic secrets, and just-in-time credentials.
- Inspect: Scanning code repositories for unsecured credentials and monitoring SSH privilege access sessions.
- Connect: Using Vault and Boundary to authenticate and authorize users with dynamic secrets.
- HashiCorp Products:
- Vault: A secrets manager for identity-based secrets management, handling secrets, certificates, keys, and data protection. It automates access to secrets and provides lifecycle management.
- Boundary: Facilitates secure remote access and least privileged access management, eliminating the need for VPNs or bastion hosts.
- Vault Radar: A new offering that scans up to 18 data sources to identify unsecured secrets, providing a dashboard for action and integration with messaging tools for automation.
- Dynamic Secrets: Vault can create short-lived credentials for one-time use, enhancing security by ensuring that even if secrets are exposed, they expire quickly.
- Session Recordings: Boundary can record privileged SSH sessions, providing detailed playback for security and compliance purposes.
Quotes:
- "The biggest concern was around leaked credentials. So credentials getting leaked outside of their organization."
- "Nine out of ten web applications were a result of stolen credentials."
- "We call it Protect, Inspect, and Connect."
- "Vault is a secrets manager for identity-based secrets management."
- "Boundary is all about least privileged access, only allowing your users access to the applications that they should be using."
- "Radar can scan up to 18 different data sources and will bring back to you where your unsecured secrets are."
- "Dynamic secrets are short-lived credentials. So basically, as a user logs into a system, a dynamic secret can be created just for that one-time example."
- "Boundary can record any privileged SSH session that happens on your organization."