{"id":55212,"date":"2018-11-29T08:00:54","date_gmt":"2018-11-29T07:00:54","guid":{"rendered":"http:\/\/e3mag.com\/?p=55212"},"modified":"2025-07-31T15:36:49","modified_gmt":"2025-07-31T13:36:49","slug":"devops-underestimated-security-risks","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/devops-risiken-werden-unterschaetzt\/","title":{"rendered":"DevOps\u2014Underestimated Security Risks"},"content":{"rendered":"<p>Digital transformation needs high agility and increasingly promotes the use of DevOps environments. That\u2019s because DevOps offers accelerated innovation, higher flexibility and reduced complexity in application development and deployment. With the implementation of DevOps, companies therefore want to primarily benefit their businesses. More often than not, however, they neglect security. A severe mistake, because DevOps significantly widens the attack surface for cyber criminals.<\/p>\n<p>If companies use DevOps models, they also have to create more privileged accounts and login details and share them automatically via integrated business networks. Those details include service accounts, keys for encryption, API and SSH, secrets of containers or embedded passwords in the code of the program which is often also stored in central repositories.<\/p><div id=\"great-331407779\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>The additional privileged login details connected to people, services and applications are an ideal target for an external attacker or a malicious insider. After all, they make it possible to control the whole IT infrastructure of a company.<\/p>\n<p>The security risk is even higher if companies use various tools for orchestrating and automating. Tools for CI (continuous integration) and CD (continuous delivery) or source code repositories like GitHub are for example used in DevOps projects. The tools that DevOps Toolchain uses, like Ansible, Chef, Puppet and Jenkins, do not have a common standard, making it challenging for companies to establish individual, specific security measures for each and every tool.<\/p>\n<p>Especially workflows for access management diverge greatly. Consequently, a lot of companies either do not have any strategies for access management, or they do, and they are inconsistent and inefficient. Security vulnerabilities are therefore a given.<\/p>\n<h2>How can we combat these developments?<\/h2>\n<p>One approach is an own DevOps security stack. Here, the IT security department has to be involved and has to systematically support DevOps teams in realizing a higher level of security. The collaboration of DevOps and security teams is therefore the first step for the successful creation of a scalable security platform and the implementation of a DevSecOps strategy which can keep up with the dynamic and the rapid pace of technology.<\/p>\n<p>All DevOps tools and login details should be managed on such a security platform. Central, automated administration and storing of all login details used in a DevOps pipeline\u2014for example API or encryption keys, data base passwords or transport layer security (TLS) certificates\u2014are essential.<\/p>\n<p>Of course, individual secrets which manage access in a DevOps production are also managed centrally and automatically. A vault\u2014a highly available, secure system storage\u2014should be used for the protection of all login details of machines, systems and people. This vault should essentially be a especially hardened server which can stop unauthorized access through various security layers.<\/p>","protected":false},"excerpt":{"rendered":"<p>More and more companies are using DevOps for efficient application deployment. DevOps promises a shorter time to market, a better product quality and higher levels of customer satisfaction. However, it also entails new security risks.<\/p>","protected":false},"author":1249,"featured_media":50414,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[24421,7,26129],"tags":[1013,451],"coauthors":[23133],"class_list":["post-55212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops-kolumne","category-meinung","category-mag-1811","tag-agilitaet","tag-devops","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2018\/07\/DevOps-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Unternehmen nutzen verst\u00e4rkt DevOps zur effizienten Applikationsbereitstellung. DevOps verspricht eine k\u00fcrzere Time-to-Market, verbesserte Produktqualit\u00e4t und h\u00f6here Kundenzufriedenheit, bringt aber auch neue Sicherheitsrisiken mit sich.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/devops-kolumne\/\" rel=\"category tag\">DevOps Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/meinung\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1811\/\" rel=\"category tag\">MAG 18-11<\/a>","author_info_v2":{"name":"Michael Kleist, CyberArk","url":"https:\/\/e3mag.com\/en\/author\/michael-kleist\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/55212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1249"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=55212"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/55212\/revisions"}],"predecessor-version":[{"id":153128,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/55212\/revisions\/153128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/50414"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=55212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=55212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=55212"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=55212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}