Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours on Instagram and YouTube and waste money on coffee and fast food, but wonât spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!
Learn from Guru Rajesh Kumar and double your salary in just one year.
Source: securityboulevard.com
DevOps and Agile are all about making software cycles short and dynamic, empowering development teams to rapidly iterate, leveraging tools with fewer burdens and reliance on outside organizations. Itâs the dev + ops combination that is so powerful. But what about security, specifically the identity of physical and virtual devices, containers and microservices? Digital certificates are a key asset in managing device identity, but traditional tools and processes may not fit the speed and dynamic nature of todayâs cloud native software.
Our guest on this DevOps Chat is Sandra Chrust, Senior Product Marketing Manager at Venafi. Sandra shares with us lessons learned to more easily manage device identities in DevOps and Agile environments, leveraging tools that provide self-service portals, APIs and SDKs for automation. No more support tickets!
As usual, the streaming audio is immediately below, followed by the transcript of our conversation.
Transcript
Mitch Ashley: Hi, everyone, this is Mitch Ashley with DevOps.com, and youâre listening to another DevOps Chat podcast. Today, Iâm pleased to be joined by Sandra Chrust, Senior Product Marketing Manager at Venafi. Our topic today is protecting machine identities. Weâre talking about DevOps and security. So, Sandra, welcome to the DevOps Chat.
Sandra Chrust: Hey, thanks, Mitchell. Happy to be here.
Ashley: Glad to have you with us. Well, letâs start by having you introduce yourself, letting us know a little bit about what you do at Venafi, and what Venafi does.
Chrust: Sure. Well, as you said, my name is Sandra Chrust, and I actually started my career as a developer, long before DevOps and agile, actually. So, I am dating myself just a little bit, there. But I come from a tech background, and here at Venafi, as the Product Marketing Manager, I basically head up our go to market strategies for cloud and DevOps.
For those of you unfamiliar with Venafi, Venafi has actually been around for well over a decade, and weâre considered the leader in what we call machine identity protection. Our customers actually include the top banks and retailers, airlines, as well as the federal government. So, the customers that we work with are the most security conscious organizations in the world.
Ashley: Mm-hmm. Well, I think thatâs a good place to go next. Those of us familiar with PKI probably know a lot about SSL certificates for servers and things like that, browsers, et cetera. But letâs jump into machine identities. What do you mean by that, why do they need to be protected, why is it different than maybe a web server or browser?
Chrust: For sure, yeah. Good question. So, what Iâm gonna do is just give a quick intro to that and then Iâll dive into more details on how that relates to DevOps, since weâre DevOps focused, here.
So, you know, before I go into that, though, I did want to mention a quick thingâwe did do a webinar last week on May 30th on DevOps.com called, âYou Use the Same Certificate Process Across Your DevOps Tool Chain.â So, just wanted to mention that if anyone is listening and they wanna jump into looking at something a little bit more visual.
You know, when you think about machine identities, you really have to think about the fact that there really are actually two actors on any network. There are people and machines, of course. And we know that people rely on the usernames and passwords that we all know and love to access machines and applications and devices. Machines, they donât use usernames and passwords, theyâre using keys and certificates. So, thatâs what we really mean here by machine identities, right, and to use that to authenticate and secure communications between machines. So, you know, when we think about machine identities, thatâs really what weâre talking about.
Ashley: So, weâre thinking machine to machine communications, encryption, identifying, making sure youâre talking to, on an authenticated device that really is what it says it isâif itâs part of an application or part of an IT or service infrastructure like an airline may be providing as part of their service?
Chrust: When you think about machine identities, theyâre really the backbone of the cyber world. You know, if you think back and go back to first principles, I think we can all agree on four things. One is that digital transformation is really creating our cyber world, and the cyber world runs on machines, right? And then the last two things are that machines have to have identities in order to communicate. So, therefore, those identities have to be protected.
And today, companies spend upwards of $8,000,000,000.00 in total on protecting human identity, but theyâre spending very little actually protecting the machine identities that run the cyber world. And some really bad things can happen if you donât protect machine identities, you know? If you think about it, machines are actually flying our airplanes, theyâre controlling the self-driving cars that are being tested out on the roads. Theyâre trading our stocks.
So, thereâs really a lot at stake when it comes to machine identities like TLS certificates and code signing certificates, things like SSH keys. So, you know, theyâre really critical to ensuring applications are secure and thereâs end to end encryption, basically, and security.
Ashley: So, if we peel apart this a little bit, because you have a really good point about digital transformation and DevOps, so many things happening in parallel. If you peel apart machine identity a little bit further, are you talking about virtualized machines, also? Are you getting into sort of containerized components or microservices and applications that need identity? How far do we go into this when we think about machine identity?
Chrust: Yeah, I think youâre spot on there. When I think about digital transformation, I really see this as being driven by three things, and what youâre mentioning is definitely a large component of that. Obviously, many companies are moving to the cloud, and using things like containers and virtual machines and serverless and things like that. And, you know, roughly three quarters of enterprises have a strategy thatâs either hybrid or multi-cloud. So, cloud computing and all of that is one big piece of that.
And then the second one is, using that modern architecture that we just talked about, you know, whenâso, basically, our organizations are trying to move applications from being monolithic applications to services, right, that are stateless, where developers are coding things to be API-centric using modern languages.
This really transformsâyou know, when we focus on TLS certificates in this world, it really transforms the way that certificates have to be managed, from a push model where youâre pushing stuff to a server to a pull model where infrastructure thatâs being instantiated as ephemeral is basically requesting a certificate so that itâs available that first minute the infrastructure is up and running. And then the third thing is DevOps, right, for high-performance IPs.
Ashley: Sounds like youâre talking about a much different world than we think of sort of a static infrastructure where TLS certificates, things that might be assigned to a visualized machine or a container or something thatâs much more dynamic may not live for five years like a device normally would. It may be something thatâs around for minutes, hours, or a few days.
Chrust: Thatâs absolutely correct. I mean, with digital transformation, we basically have machines being created by other ones, right? Infrastructure as code, if you think of that, the code itself being a machine, itâs creating all of these other machines, right? And so, whatâs happening is, machine identity proliferation is really going at an alarming rate.
Ashley: Mm-hmm.
Chrust: And so, you know, it is, in this new world, the other thing to think about is, you know, you no longer have this static infrastructure that youâre referring to where you can just wall it off, right? You can just create that firewall and then put everything inside there and know that itâs protected.
Ashley: Right.
Chrust: In this new world, perimeter is gone, itâsâyou know, you have to assume you have a zero-trust environment. So, certificates become even more important to be available and to protect everything across the entire application stack.
Ashley: Iâm curious, as you work with customers, prospective customersâhow many of them see this as the problem that theyâre either dealing with today or is it something theyâre working to and youâre having to help them understand what theyâre moving towards and what the impact of that is?
Chrust: You know, thatâs a really great question. I think that security teams are obviously outnumbered and today, theyâre focusing on, evenâtheyâre still trying to actually solve the old problems around certificates and present them with living infrastructure. And DevOps is sort of going off andâyou know, theyâre going off the reservation, so to speak, and doing whatever they need to to get certificates.
So, weâre actually trying to educate our customers about the risk of having these DevOps individuals, developers and operations teams kind of creating their own security infrastructure. So, I would say more progressive customers are realizing that itâs an issue, but weâre also having to educate to kind of wave that flag that says, âHey, figure it out today so that in the future, the problem is under control,â and then youâre not trying to solve for a zillion variables versus just a single variable today. So yes, it depends, actually, on the customer.
Ashley: Do you think most security teams or security parts of the organization know this is happening within the DevOps world, or are they just coming to realize that and trying to grapple with what do they do about it?
Chrust: I think securityâwe have to give them credit, right? I think they understand it. But many security teams just donât have a good solution in place. Apps at Venafi, for example, there isnât anything really available out there that gives them the centralized level of control and the ability to offer a solution for a DevOps environment in an easy way. So, itâs really a lack of solutions that they donât have that in their toolbox today. Itâs just not available.
Ashley: Mm-hmm. Well, letâs go right there, then. What kind of guidance do you give security and DevOps teams when it comes to certificates?
Chrust: You know, I think thatâwell, first of all, I mean, let me talk just briefly about what weâre seeing people doing today.
Ashley: Okay.
Chrust: When we think about whatâs happening todayâand I kinda, I made the analogy of the DevOps folks are going off the reservationâreally, what security and developers are doing today is, theyâre really doing the best they can. What weâre seeing is that application development teams that leverage DevOps practices and tools, theyâre creating their own security infrastructure. Theyâre essentially reinventing the wheel, right?
Ashley: Mm-hmm.
Chrust: Because security teams just donât have a good solution. And then security teams, meanwhile, are kinda crossing their fingers that the auditors arenât gonna peel that onion just yet. [Laughter] But thatâs coming, right? Thatâs coming. Because the auditors are coming very soon.
So, when you think about whatâs happening, thereâs actually a lot of pain within the developers themselves and the operations team members themselves. They may not be verbalizing it, though. They may not be doing that, because theyâre thinking, âOh, weâve got it under control, and weâre using solutions that are just at our disposal and we donât have to ask security for any kind of support.â
Ashley: Mm-hmm.
Chrust: So, they think, âIâm gonna move faster if I just do it myself.â And so, yeah, so, one of the things that weâre seeing is that there are a lot of different methods that DevOps teams are employing today for getting certificates into these dynamic environments. And we might be using everything from OpenSSL on our local work stations to using something called HashiCorp Vault, which is a very popular tool out there. I donât know if youâve heard of it, but you can issue a subordinate CA or a self-line certificate and really suck in using HashiCorp Vault.
You know, there are issues with that, because thereâs many instances of Vault oftentimes being used and thereâs no unified policy and no visibility, right, across these things.
Ashley: Mm-hmm.
Chrust: So, then, you know, the other thing that weâre still hearingâwhich, you know, it makes senseâweâre still hearing that security teams are telling DevOps teams you need to submit a ticket to get a certificate. So, you know, these different waysâticketing tools and using HashiCorp Vault, using LetsEncryptâall of this is basically either slow or itâs automated but it doesnât provide the visibility and thereâs no policy enforcement.
Ashley: Mm-hmm.
Chrust: One thing I want to elaborate on there is that oftentimes organizations move their applications to the cloudâyou know, like an AWS or an Azure, and letâs take, for example, AWS. Theyâre like, âOh, this is great! It provides Amazon Certificate Manager. Thatâs gonna help me a ton, right?â
Ashley: [Laughter] Mm-hmm.
Chrust: [Laughter] But the thing is, the Amazon Certificate Manager is kind of like a shiny object, right? Itâs meant to keep you there, and Amazon is a very smart company andâyou know, I mean, I know how much I spend on Amazon Prime, so, Iâm just gonna say, theyâre pretty sticky.
Ashley: [Laughter] Iâm there with you.
Chrust: Yeah. [Laughter] So, Amazon Certificate Manager actually provides us easy access to free certificates, right? But the challenge is that it only does a great job around native infrastructure, like an AWS Load Balancer, for example. And then everything else, right, thatâs hosted in AWS, it doesnât do anything for you in terms of automating certificate renewal.
And so, what weâre hearing is that companies are lifting their infrastructure and putting it in the cloud, theyâre not getting these automated renewals happening, and so outages are still happening. So, thatâs one issue.
Ashley: Mm-hmm.
Chrust: And then the other thing, too, isâyou know, I spoke to this earlier. Many companies use more than one cloud provider.
Ashley: Absolutely.
Chrust: And so, what are we supposed to do at that point once youâre locked into the Amazon Certificate Manager? Youâve gotta re-code your application, right, to use an Azure or Google Compute platform.
So, anyway, so thereâs a whole bunch of challenges there in addition to, you know, I heard one of our customers the other day say they had 2,500 AWS accounts and 1,500 Azure accounts.
Ashley: Wow. Wow.
Chrust: So, think about that for a moment, right?
Ashley: Thatâs a few. Thatâs a few.
Chrust: Yeah, just a few, and the thing is, thereâs no centralized visibility, thereâs no centralized policy control. And so, imagine if quantum computing comes along and the algorithms need to change or if thereâs a policy change or who knows, what have you, right? Youâre gonna have to change up a lot of different settings in many different AWS accounts.
So, there is just a complexity. [Laughter] Thereâs just kind of a mĂŠlange of issues that happen once you start doing something like that and then over time, you want to change your cloud strategy. So, you know, just to kind of paint a picture. And then the last thing is, developers love their toolchain tool, so theyâre using things like Kubernetes secrets and Ansible vaults and, you know, CredHub, for example, from Pivotal.
So, you can see thereâs a kind of complexity thatâs being introduced into very complex environments. So, itâs really hard to manage today.
Ashley: Well, I think if you look at it as issuing certificates on a one by one basis, thatâs where you fall into this trap of this PKI security certificates, all of that need to be managed as an architecture, as a design with its own processes and management of it just like you would source code or continuous improvement or whatever it might be. So, I gotta imagine Venafi does something to help with this. What can you do?
Chrust: Thatâs a great point. I mean, when you think about best practices around using open source, right? They say you should use open source and have an inventory of everything, like a bill of materials of whatâs in your code. When you think about certificates today, itâs really an ad hoc solution, right? Itâs almost like theyâre piecing together a bunch of open source stuff and [Cross talk] centralized control. Yeah, exactly.
So, you know, when it comes to Venafi, what weâre really excited about is that the world is finally waking up to and realizing that thereâs an issue relative to certificates in DevOps environments and beyond. And one thing I wanted just to highlight before I go into what Venafi does is that there is no guidance from the National Institute of Standards and Technology, NIST. And the guidance is NIST 1800-16, volume B, and thereâs like four volumes, anyway. But itâs talking about several different things, and one of them is, because itâs a new guidance thatâs come outâit came out the end of last yearâitâs still in draft form because of the government shutdown, as we recall earlier this year. But this guidance actually provides 50 pages of really good information for organizations that are looking to resolve these issues right around certifications.
And it addresses DevOps directly. Like, the word DevOps actually shows up in this guidance, which is really nice to see, and it talks about how certificate owners are changing, right, so now, itâs not like Charlie whoâs managing the .DNL server, itâs infrastructure as code creating a whole bunch of different stuff every single minute.
Ashley: Mm-hmm.
Chrust: And then thereâs actually an âah haâ moment when you read about whatâs in the NIST guidance where it talks about setting up a certificate service. And what it does it, it really discusses that the PKI team or the security team should establish a certificate service because itâs the most effective and efficient approach to solving this problem, and that includes providing a technology based solution that provides automation and also supports effectively managing certificates over time.
Ashley: So, weâre coming up on close to the end of our podcast time. I wanna make sure you get a chance. I kinda feel like youâre leading us up to what Venafi can do to help you establish that certificate service.
Chrust: For sure, yeah. So, what Venafi has is a machine identity protection platform that really helps to centralize control and also provides a single pane of glass to all certificates.
Ashley: Mm-hmm.
Chrust: And, you know, if you think about the core platform, it allows security teams to get centralized access to inventory so they know every certificate thatâs being used, it allows them to set up policy, they get reports for audit and compliance checks and then we have self-service capabilities that can be offered to DevOps teams.
So, specifically around that, weâobviously, our platform is API enabled. So, we have a well-documented REST API and what we call a VCert, like Venafi Cert, utility thatâs available for a command line and also, thereâs an SDK, so that you can incorporate it into applications and tools that are in Go and Python and Java and other modern languagesâwell, Java not so much.
So, Venafi really is just a management layer and weâre not actually serving as a CA. So, I just wanna make sure thatâs clear, that weâre not a certificate authority.
Ashley: Okay, thatâs a good clarification.
Chrust: Yeah. Weâre linked to every major certificate authority and we have adapters that you can basically hook into any CI that you wanna use.
Ashley: Mm-hmm.
Chrust: So, for DevOps, we have integrations, obviously, for the native toolchain as well so that you can hook Venafi into, for example, Kubernetes. We, JetStack is a Cert Manager that is an open source utility that we are integrated with. So, with that, you can incorporate any certificate from any CA, and also automatically renew those certificates within your Kubernetes clusters. So, thatâs really valuable.
Ashley: Well, I think youâve said a lot of important things and I think a couple of things that will definitely stand out to our DevOps listeners is self-service, APIs, SDK, et cetera, so they donât feel like they have to go open a ticket for every time they need something, that this can fit into the DevOps and the agile workflows, so thatâs awesome.
Chrust: Itâs really awesome, because once our solution is in place, DevOps team can just run and continue to move at high speed. And then if thereâs a PKI event or something that needs to be changed, it doesnât impact them any more.
Ashley: So, I appreciate, Sandra, you joining us today. Youâve been a part of another DevOps Chat podcast, and it seems like timeâs flown by again. Iâd like to thank Sandra Chrust, Senior Product Marketing Manager at Venafi, for joining us, and to thank youâyou, our listenersâfor joining us, also. This is Mitch Ashley with DevOps.com. Youâve listened to another DevOps Chat.