51 subscribers
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 The Final Flight of Captain Forrester | 1. The Mystery of Tiny 05 38:05
Managing Secrets - Vlad Matsiiako - ASW #327
Manage episode 478428348 series 2086046
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user password rotations, but that doesn't mean there isn't a place for rotating secrets. It means that the tooling and processes for ephemeral secrets should be based on secure, efficient mechanisms rather than putting all the burden on users. And it also means that managing secrets shouldn't become an unmanaged risk with new attack surfaces or new points of failure.
Segment Resources:
- https://infisical.com/blog/solving-secret-zero-problem
- https://infisical.com/blog/gitops-secrets-management
Show Notes: https://securityweekly.com/asw-327
657 episodes
Manage episode 478428348 series 2086046
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user password rotations, but that doesn't mean there isn't a place for rotating secrets. It means that the tooling and processes for ephemeral secrets should be based on secure, efficient mechanisms rather than putting all the burden on users. And it also means that managing secrets shouldn't become an unmanaged risk with new attack surfaces or new points of failure.
Segment Resources:
- https://infisical.com/blog/solving-secret-zero-problem
- https://infisical.com/blog/gitops-secrets-management
Show Notes: https://securityweekly.com/asw-327
657 episodes
All episodes
×
1 Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328 44:08

1 Managing Secrets - Vlad Matsiiako - ASW #327 1:03:03

1 More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326 1:14:45

1 In Search of Secure Design - ASW #325 1:07:36

1 Avoiding Appsec's Worst Practices - ASW #324 1:11:19

1 Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323 54:08

1 Redlining the Smart Contract Top 10 - Shashank - ASW #322 53:01

1 Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321 33:17

1 CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321 40:34

1 QR Codes Replacing SMS, MS Pulls VSCode Extension, Threat Modeling, Bybit Hack - ASW #320 33:55

1 Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320 35:08

1 Regex DoS, LLM Backdoors, Secure AI Architectures, Rust Survey - ASW #319 36:26

1 Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319 33:56

1 Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318 44:57

1 Unforgivable Vulns, DeepSeek iOS App Security Flaws, Memory Safety Standards - ASW #317 35:52
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.