SlideShare a Scribd company logo
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Oded Hareven,
CEO & Co-founder @ Akeyless
Oded@akeyless.io
{Ret. Captain, Israel Defence Forces, CyberSecurity
Identity Management, PAM, Information Security Infrastructure
Dev, Product, Ops}
The Key to Strong Cloud Security
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Akeyless DFC™ Virtual HSM
Unique KMS Zero-
Knowledge
Technology, built
for Hybrid era
Unified SaaS IAM
(1) Secrets Management
(2) Secure Remote Access
(3) Data Protection
Akeyless Vault Platform
Workload Identity Orchestration
Serving market
leaders enterprises
Pharma, Software, Adtech,
Online, E-commerce,
Gaming
Globally Available SaaS
3
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Challenges of the DevOps and Cloud Era
• Ephemeral resources + Automation + IaC
• Multiple environments
• Hybrid Authentication
• Perimeter-less world = data is everywhere
• Root-of-trust in a non-trusted distributed architecture
• Privileged Access (Remote, WFH, COVID-19)
4
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Admin Password
PKI Certificate
Application
API-Key
SQL Credentials
AES Encryption
RSA Signing Key
SSH Key
In short, it’s an IAM Chaos.
Credentials
SSH Certificate
Trends that encourage the
Massive use of Secrets
1. Containerization
2. Hybrid & multi-cloud
3. DevOps, CI/CD, Automation
4. Zero-Trust
5
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Data encryption
Step #1: Data Protection & Access Control
• Access Control
• Control who can access the data?
• How to validate her identity?
• Data Encryption
• Control who can access the encryption key?
• How to validate his identity?
Data
Access Control
6
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Step #2: Identity Validation
• Requires Authentication
• Human
• Machine
• Using something that only the human/machine has
• Secret = {password, credentials, api-key, certificate, ssh-key}
• If you can’t keep a Secret - you can’t protect your Data...
Password DB password
DB
User Application
7
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Step #3: Privileged Access
• Who’s controlling my workloads?
• Software Developers, DevOps Engineers, IT Architects
• External vendors
• Can they impersonate?
• Admin can do everything...
• PAM
• Regulation and compliance
• Session recording - Control human admin access
• Secrets Repository
• Default admin passwords rotation
• Automation = Machines’ Privileged Access
Password DB password
DB
User Application
Admin
OS Admin OS Admin
Password
Password
8
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Step #4: Root-of-Trust
• Using an Encryption key to encrypt secrets & data
+Using signing key to sign TLS/SSH Certificates = identities
• Where to place the key?
• Configuration - bad practice
• Local store - not secured enough
• KMS - good start
• HSM - considered to be most secure
• Secret-zero: accessing the key requires a secret?
The chicken and the egg...
Hardware Security Module
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Secrets Sprawl: Clear-text, unprotected
Source Code
DevOps Scripts Configuration Files
x
myScript
{
// App.Config
DB password = “T0pSecr3t”
API_Key_AWS = “Cl3aRt3xt$!”
}
x
//myconfig
<
// App.Config
Access_Token = “T0pSecr3t”
API_Key_GCP = “Cl3aRt3xt$!”
/>
x
Void myCode( )
{
// App.Config
Encryption_Key = “aKey43!t”
API_Key_Azure = “Cl3a3xt$!”
}
Secrets are used also within workload management platforms
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
10
Report:"Managing Machine Identities, Secrets, Keys and Certificates"
Published: 24 August 2020 Analyst: Erik Wahlstrom
Source:
Akeyless is mentioned in this Gartner report as a key player
in the Secrets Management realm, p16. under “secrets management solutions”
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Secrets Management
Fetch credentials, certificates and keys from any client - platform, script or application
*****
*****
***** API / SDK / CLI / Plugins
Customer
Application
Customer
Database
3rd-party
Service
API
Password = “Pass12#”
Applications
Encrypted Secrets Store
Human
DevOps, IT, Developers
Secrets Management
12
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Multi-channel Integration and Authentication
Authentication via
LDAP
SAML
OpenID
Direct channels
Platforms Plugins (examples)
Machine
authentication
Human
authentication
13
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Availability and Scalability
What happens when all your workloads and
employees are using a centralized Secrets
Management system?
• Ensure Service Continuity
• Multi-region / hybrid / multi cloud
• Disaster Recovery, Replication,
Backup, Monitoring
• Complex IT project
• Consider: Self-deployment vs. SaaS
14
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Data encryption
Yet this is not all….
Data
Access Control
15
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Just-in-time temporary credentials
+SSH, RDP, Kubectl, SQL, Web applications and more...
Isolated Session
+Session Recording & transcript
Zero-Trust Privileged Access / PAM 2.0
How to provide a Secure Workload Access?
External Access
Employee/Vendor
Internal Resources
Linux Servers
Windows servers
Databases
Web applications
Private Network
Public Network
SSH Tunnel
Identity Providers
Via LDAP, SAML, OpenID
Customer Side
*TrustScore Ready
internal Access
Employee
Proprietary and Confidential, Akeyless Security Ltd ©️ 2021
Thank you.
Further questions & thoughts you’d like to share?
Mostly invited to drop an email to Oded@akeyless.io

More Related Content

PDF
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
PPTX
Kubernetes Secrets Management - Securing Your Production Environment
PPTX
IBM Secret Key management protoco
PPTX
The Rise of Secrets Management
PDF
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
PDF
Secrets as Code
PDF
Automation Patterns for Scalable Secret Management
PDF
Hardening Kubernetes Cluster
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets Management - Securing Your Production Environment
IBM Secret Key management protoco
The Rise of Secrets Management
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secrets as Code
Automation Patterns for Scalable Secret Management
Hardening Kubernetes Cluster

What's hot (19)

PPTX
Secret Management Architectures
PPTX
Let's get started with passwordless authentication using windows hello in you...
PDF
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
PDF
Streamline CI/CD with Just-in-Time Access
PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
PDF
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
PDF
Recipe for good secrets management
PPTX
Securing sensitive data with Azure Key Vault
PDF
Shifting security left simplifying security for k8s open shift environments
PPTX
Azure key vault
PPTX
Zero trust Architecture
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
PPTX
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
PDF
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
PPTX
Secret Management with Hashicorp Vault and Consul on Kubernetes
PPTX
Azure security basics
PDF
Spring boot-vault
PPTX
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
PPTX
Using Puppet With A Secrets Server
Secret Management Architectures
Let's get started with passwordless authentication using windows hello in you...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Streamline CI/CD with Just-in-Time Access
Global Azure Bootcamp 2017 - Azure Key Vault
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Recipe for good secrets management
Securing sensitive data with Azure Key Vault
Shifting security left simplifying security for k8s open shift environments
Azure key vault
Zero trust Architecture
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Secret Management with Hashicorp Vault and Consul on Kubernetes
Azure security basics
Spring boot-vault
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
Using Puppet With A Secrets Server
Ad

Similar to The Key to Strong Cloud Security (20)

PPTX
Application security meetup - cloud security best practices 24062021
PPTX
Akeyless Security - The best cyber security company to watch 2022- The Silico...
PPTX
Where to Store the Cloud Encryption Keys - InterOp 2012
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PDF
Managing secrets at scale
PDF
Where Data Security and Value of Data Meet in the Cloud
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PDF
Essentials of Network and Cloud Security.pptx.pdf
PPTX
Brave new world of encryption v1
PDF
Rugged Building Materials and Creating Agility with Security
PPT
Securing Your Data In The Cloud
PDF
Where data security and value of data meet in the cloud ulf mattsson
PDF
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
PPTX
AWS Security and Encryption
PPTX
Encryption in the enterprise
PDF
Protect Your Sensitive Data with Gemalto Guidebook
PPTX
UNEC__1732702810.pptxddgdfvcfgg hxh f f g h s s. Rcyctcecec
PPT
Aws training in bangalore
PDF
SafeNet - Data Protection Company
PDF
Enterprise Cloud Security
Application security meetup - cloud security best practices 24062021
Akeyless Security - The best cyber security company to watch 2022- The Silico...
Where to Store the Cloud Encryption Keys - InterOp 2012
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Managing secrets at scale
Where Data Security and Value of Data Meet in the Cloud
Where data security and value of data meet in the cloud brighttalk webinar ...
Essentials of Network and Cloud Security.pptx.pdf
Brave new world of encryption v1
Rugged Building Materials and Creating Agility with Security
Securing Your Data In The Cloud
Where data security and value of data meet in the cloud ulf mattsson
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
AWS Security and Encryption
Encryption in the enterprise
Protect Your Sensitive Data with Gemalto Guidebook
UNEC__1732702810.pptxddgdfvcfgg hxh f f g h s s. Rcyctcecec
Aws training in bangalore
SafeNet - Data Protection Company
Enterprise Cloud Security
Ad

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced IT Governance
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced Soft Computing BINUS July 2025.pdf
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Advanced IT Governance
Per capita expenditure prediction using model stacking based on satellite ima...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

The Key to Strong Cloud Security

  • 1. Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Oded Hareven, CEO & Co-founder @ Akeyless Oded@akeyless.io {Ret. Captain, Israel Defence Forces, CyberSecurity Identity Management, PAM, Information Security Infrastructure Dev, Product, Ops} The Key to Strong Cloud Security
  • 2. Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Akeyless DFC™ Virtual HSM Unique KMS Zero- Knowledge Technology, built for Hybrid era Unified SaaS IAM (1) Secrets Management (2) Secure Remote Access (3) Data Protection Akeyless Vault Platform Workload Identity Orchestration Serving market leaders enterprises Pharma, Software, Adtech, Online, E-commerce, Gaming Globally Available SaaS
  • 3. 3 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Challenges of the DevOps and Cloud Era • Ephemeral resources + Automation + IaC • Multiple environments • Hybrid Authentication • Perimeter-less world = data is everywhere • Root-of-trust in a non-trusted distributed architecture • Privileged Access (Remote, WFH, COVID-19)
  • 4. 4 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Admin Password PKI Certificate Application API-Key SQL Credentials AES Encryption RSA Signing Key SSH Key In short, it’s an IAM Chaos. Credentials SSH Certificate Trends that encourage the Massive use of Secrets 1. Containerization 2. Hybrid & multi-cloud 3. DevOps, CI/CD, Automation 4. Zero-Trust
  • 5. 5 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Data encryption Step #1: Data Protection & Access Control • Access Control • Control who can access the data? • How to validate her identity? • Data Encryption • Control who can access the encryption key? • How to validate his identity? Data Access Control
  • 6. 6 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Step #2: Identity Validation • Requires Authentication • Human • Machine • Using something that only the human/machine has • Secret = {password, credentials, api-key, certificate, ssh-key} • If you can’t keep a Secret - you can’t protect your Data... Password DB password DB User Application
  • 7. 7 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Step #3: Privileged Access • Who’s controlling my workloads? • Software Developers, DevOps Engineers, IT Architects • External vendors • Can they impersonate? • Admin can do everything... • PAM • Regulation and compliance • Session recording - Control human admin access • Secrets Repository • Default admin passwords rotation • Automation = Machines’ Privileged Access Password DB password DB User Application Admin OS Admin OS Admin Password Password
  • 8. 8 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Step #4: Root-of-Trust • Using an Encryption key to encrypt secrets & data +Using signing key to sign TLS/SSH Certificates = identities • Where to place the key? • Configuration - bad practice • Local store - not secured enough • KMS - good start • HSM - considered to be most secure • Secret-zero: accessing the key requires a secret? The chicken and the egg... Hardware Security Module
  • 9. Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Secrets Sprawl: Clear-text, unprotected Source Code DevOps Scripts Configuration Files x myScript { // App.Config DB password = “T0pSecr3t” API_Key_AWS = “Cl3aRt3xt$!” } x //myconfig < // App.Config Access_Token = “T0pSecr3t” API_Key_GCP = “Cl3aRt3xt$!” /> x Void myCode( ) { // App.Config Encryption_Key = “aKey43!t” API_Key_Azure = “Cl3a3xt$!” } Secrets are used also within workload management platforms
  • 10. Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 10 Report:"Managing Machine Identities, Secrets, Keys and Certificates" Published: 24 August 2020 Analyst: Erik Wahlstrom Source: Akeyless is mentioned in this Gartner report as a key player in the Secrets Management realm, p16. under “secrets management solutions”
  • 11. Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Secrets Management Fetch credentials, certificates and keys from any client - platform, script or application ***** ***** ***** API / SDK / CLI / Plugins Customer Application Customer Database 3rd-party Service API Password = “Pass12#” Applications Encrypted Secrets Store Human DevOps, IT, Developers Secrets Management
  • 12. 12 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Multi-channel Integration and Authentication Authentication via LDAP SAML OpenID Direct channels Platforms Plugins (examples) Machine authentication Human authentication
  • 13. 13 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Availability and Scalability What happens when all your workloads and employees are using a centralized Secrets Management system? • Ensure Service Continuity • Multi-region / hybrid / multi cloud • Disaster Recovery, Replication, Backup, Monitoring • Complex IT project • Consider: Self-deployment vs. SaaS
  • 14. 14 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Data encryption Yet this is not all…. Data Access Control
  • 15. 15 Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Just-in-time temporary credentials +SSH, RDP, Kubectl, SQL, Web applications and more... Isolated Session +Session Recording & transcript Zero-Trust Privileged Access / PAM 2.0 How to provide a Secure Workload Access? External Access Employee/Vendor Internal Resources Linux Servers Windows servers Databases Web applications Private Network Public Network SSH Tunnel Identity Providers Via LDAP, SAML, OpenID Customer Side *TrustScore Ready internal Access Employee
  • 16. Proprietary and Confidential, Akeyless Security Ltd ©️ 2021 Thank you. Further questions & thoughts you’d like to share? Mostly invited to drop an email to Oded@akeyless.io