October 2018 AST 'ASTORS' Finalist Edition Oct 2018 AST Magazine Final (10.16.18) | Page 71

party applications to ensure protection. Volume 27 September 2018 Edition Manage NIX SSH keys • Attackers can leverage un- managed SSH keys to login with root access and take over the NIX technology stack, so make sure all SSH key pairs on Linux and Unix production servers are vault- ed and rotated on a routine basis, as these systems often house highly sensitive as- sets. cates that 57 percent of federal organizations Defend DevOps secrets experienced a data breach in the past year, in • To ensure attackers can’t exploit your DevOps comparison to just 26 percent of non-U.S. gov- environment for more pervasive access, vault ernment agencies worldwide. and automatically rotate your public cloud privileged accounts, keys and API keys as well • Furthermore, 68 percent of respondents said their government organizations are “very” or as any credentials and secrets used by CI/CD “extremely” vulnerable to current cyber securi- tools such as Ansible, Jenkins and Docker. ty challenges, while only 48 percent of global counterparts admit to the same. Secure SaaS admins and privileged users • Confirm that all access to shared IDs is isolated and require multi-fac- tor authentication to prevent attackers from gaining high-level and stealthy access to sensi- tive systems by stealing credentials used by SaaS administrators and privi- leged business users. Remaining Vigilant • Recent research indi- (Cindy Provin, CEO of Thales eSecurity, discusses key findings from Thales eSecuri- ty’s 2018 Data Threat Report, Global Edition.) 69