Good practices with secrets and privilege management on Kubernetes
Details
### Calling all developers, operations roles, and security professionals! RSVP today to join our next in-person event.
This technical workshop showcases CyberArk’s secret management solution deployed on Red Hat® OpenShift® - one that improves and simplifies the security of Red Hat OpenShift containerized environments with out-of-the-box certified integrations. CyberArk’s unified identity and privilege platform is ranked #1 by Gartner as it centralizes all human and non-human credentials so developers can focus on releasing code, not on mundane security tasks.
This workshop will cover the following topics:
- How an application can retrieve secrets using the CyberArk Secrets Management REST API
- How an application can use vaulted secrets injected as environment variables using Summon
- How an application can use vaulted secrets as native K8s/OpenShift secrets
- How an application can connect to a database without any access or potential exposure to credentials
- Strong authentication for playbooks
Presenters:
- Inyoung Cho, Senior Solution Architect, Red Hat
- Rama Krishna Bhupathi, Senior Solution Architect, Red Hat
- Dennis Mastin, Senior Solution Architect, CyberArk
