IT leaders need purpose-built PAM solutions, ThycoticCentrify finds
More than half of organisations have experienced security incidents related to exposed secrets in the past two years, but development teams are still using the same secrets management processes and tools.
The Forrester Opportunity Snapshot report commissioned by ThycoticCentrify, titled 'Secure Innovation Requires Making DevOps Secrets Management Invisible', surveyed 227 identity and access management (IAM) decision makers and 160 members of development teams in North America, EMEA and APAC.
While 68% of developers agree that management prioritises security over release dates, 53% of IAM leaders claim developers lack the understanding or ability to implement proper security controls.
The report also finds that while both IAM leaders and developers want to simplify access management, secure access controls are often too manual and full of friction, bottlenecking innovation.
ThycoticCentrify chief technology officer David McNeely says, “The migration to cloud and the drive to microservice architectures require a shift to automated application delivery.
"These new application architectures must be designed with security in mind to ensure compliance and protect the integrity and reputation of the company.
“Securing these new applications should be easy for developers, while simultaneously enabling the flexibility that operations teams need to respond to the demands of the business."
McNeely says, "This report provides encouraging validation that both security leaders and developers want to centralise and embed secrets management into the tools already in use in continuous integration, continuous deployment pipelines.”
The key to solving this challenge is to make secrets management invisible to developers and DevOps teams, who agree that doing so would improve their experience (63%) and productivity (69%).
To accomplish this, 76% of IAM leaders are looking for purpose-built PAM for DevOps solutions that would help development and security teams work better together, the company states.
For instance, ThycoticCentrify’s PAM for DevOps secrets management solution, DevOps Secrets Vault, enables organisations to centrally manage, control and audit secrets for automated processes that operate without human oversight.
DevOps Secrets Vault improves productivity for both developers and security teams by reducing friction, embedding automated secure access controls into the DevOps process.
ThycoticCentrify recently introduced geolocation-based routing to ensure customers automatically route to the cloud service closest to their data centers to optimise performance and ensure active failover.
The solution has also been improved for ease of use, now allowing non-DevOps users the ability to view and manage DevOps Secrets Vault via a user interface versus the Command Line Interface (CLI).
ThycoticCentrify is a cloud identity security vendor, enabling digital transformation at scale.
ThycoticCentrify’s privileged access management (PAM) solutions are designed to reduce risk, complexity and cost while securing organisations’ data, devices and code across cloud, on-premises and hybrid environments.
The company's solutions are used by more than 14,000 organisations around the globe including financial institutions, intelligence agencies and critical infrastructure companies.