Venafi Study: Weak Cryptographic Security Controls Epidemic Among DevOps Teams

AUSTIN, Texas--()--DockerCon Booth S35 – Venafi®, the leading provider of machine identity protection, today announced the results of a study on the cryptographic security practices of DevOps teams. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications.

According to the study, many organizations fail to enforce vital cryptographic security measures in their DevOps environments. These problems are especially acute among organizations that are in the midst of adopting DevOps practices, but even organizations that say their DevOps practices are mature do not follow security practices designed to protect cryptographic keys and digital certificates.

“It’s clear that most organizations are still struggling with securing the cryptographic keys and digital certificates used to uniquely identify machines,” said Kevin Bocek, chief security strategist for Venafi. “Although DevOps teams indicate that they understand the risks associated with TLS/ SSL keys and certificates, they clearly aren’t translating that awareness into meaningful protection. This inaction can leave organizations, their customers and partners extremely vulnerable to cryptographic threats that are difficult to detect and remediate.”

Key study findings:

  • The vast majority (82 percent) of respondents from organizations with mature DevOps practices say corporate key and certificate policies are enforced consistently. In organizations in the midst of adopting DevOps practices, just over half (53 percent) enforce these policies consistently.
  • In mature DevOps organizations, almost two-thirds (62 percent) of DevOps teams consistently replace development and test certificates with production certificates when code rolls into production. In organizations that are just adopting DevOps practices, only a bit over one-third (36 percent) follow this critical best practice. Without changing certificates, there is no way to distinguish between the identities of trusted machines that are safe to place in production and untested machines that should remain in development.
  • 89 percent of respondents with mature DevOps practices say their DevOps teams are aware of the security controls necessary to protect their organizations from attacks that leverage compromised keys and certificates; in organizations adopting DevOps only 56 percent believe their teams are aware of these controls.
  • 80 percent of mature DevOps respondents and 84 percent of adopting respondents allow self-signed certificates. Self-signed certificates can be issued quickly, however they can make it difficult to uniquely identify that machines belong and can be trusted.
  • Key reuse is a problem: 68 percent of mature DevOps respondents and 79 percent of adopting respondents said they allow key re-use. While key re-use saves time if a cyber criminal is able to gain access to one key they will automatically gain access to any other environment or application where the key is used.

As the speed and scale of DevOps development intensifies, the use of secure encrypted communications explodes. Without robust security measures and practices, successful attacks that target DevOps keys and certificates can allow attackers to remain hidden in encrypted traffic and evade detection. According to a recent report from A10 Networks, 41 percent of cyber attacks used encryption to evade detection.

“If the keys and certificates used by DevOps teams are not properly protected, cyber criminals will be able to exploit SSL/TLS keys and certificates to create their own encrypted tunnels,” said Tim Bedard, director of threat intelligence and analytics for Venafi. “Or attackers can use misappropriated SSH keys to pivot inside the network, elevate their own privileged access, install malware or exfiltrate large quantities of sensitive corporate data and IP, all while remaining undetected.”

The study was conducted by Dimensional Research in November 2016. Study respondents included 431 IT professionals responsible for cryptographic assets in companies with DevOps programs in the U.S. and Europe.

For more information, please visit: https://www.venafi.com/research/mature-devops-study

Additional resources

BLOG: Self-signed Certificates Open a Can of Worms for DevOps Security Teams

BLOG: Wildcard Certificates Make Encryption Easier, But Less Secure.

BLOG: 3 Steps that Stop the Speed of DevOps from Introducing Security Risk

About Venafi

Venafi is the market-leading cybersecurity company that secures and protects the cryptographic keys and digital certificates every business and government depends on for secure communications, commerce, computing, and mobility. Venafi provides the Immune System for the Internet® and constantly assesses which keys and certificates are trusted, protecting those that should be trusted, and fixing or blocking those that are not. By protecting the foundation of all cybersecurity—keys and certificates—Venafi prevents them from being misused by cyber criminals. The Venafi Trust Protection Platform delivers an ever-evolving, intelligent response that protects your network, business, and brand.

Venafi customers are among the world's most demanding, security-conscious Global 2000 organizations, including four of the top five U.S. banks, eight of the top 10 U.S. health insurance companies and four of the top seven U.S. retailers. Venafi is backed by top-tier venture capital funds, including Foundation Capital, Intel Capital, Origin Partners, Pelion Venture Partners, QuestMark Partners and Silver Lake Partners. For more information, visit www.venafi.com.

Contacts

Venafi
Shelley Boose, 408-398-6987
shelley.boose@venafi.com

Release Summary

Many organizations do not follow security practices designed to protect cryptographic keys and digital certificates in their DevOps environments.

Contacts

Venafi
Shelley Boose, 408-398-6987
shelley.boose@venafi.com