Podcast
Root Causes 69: Fundamentals of DevOps and PKI


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 28, 2020
In our ongoing series on DevOps and PKI, DevOps practitioner David Colon joins us to help describe the intersection of DevOps security and PKI. We explore how PKI fits in with orchestration engines like Kubernetes and some of the practical considerations in securely using keys in such environments.
Podcast Transcript
Lightly edited for flow and brevity.
Now, the second approach to the whole DevSecOps is kind of what I just alluded to is the code aspect. So, one thing about DevOps culture that enables better communication, automation, is by using toolsets that have been available to developers, like Git, ORequest and these workflows and in giving that same toolset to operations teams and security teams. So that way, everyone can do peer reviews, can learn from the process and have guardrails, which is very friendly towards compliance departments.
But then number two is that the identity piece is also really important because if I could manage to inject a false microservice into the cloud I could harvest information, give bad commands, give access, all of those doorways to breaches and attack and so, we need this to protect from really both of those scenarios. Right?
I’m gonna put you on the spot for maybe my last question for today, but I’ve heard of some real bad stuff. In fact, I’ve even seen it in some areas where people have in their automation script put things like their hard-coded credentials and perhaps even things related to certificates. Is that something that you are wary of and I think that the bigger question I’m asking here is I always like to sometimes leave the audience with either some homework or a best practice to really think about. What’s top of mind for you, Dave.
And another thing, too, to think about is if you have hundreds of thousands of these existing and let’s say they exist for four hours, how do you store and track that from a historical preference? There is a lot of gray area when it comes to compliance depending on the industry demand of whether or not you have to show something that backdates two years because that’s a lot of stored logs and auditing and which can be quite costly as well.
So, gee, I think that this is a deep, rich and interesting topic and we have barely scratched the surface and what I would like to suggest to both of you gentlemen is that we need to ask Dave to come back and we need to dive deep on some of the things we’ve discussed today and other aspects of DevSecOps as well. Does that sound like a good idea?

