Shhh!: 12 Practices for Secret Management
in Infrastructure as Code
#IEEESecDev https://secdev.ieee.org/2021
Patrick Morrison
Akond Rahman Farhat Lamia Barsha
Infrastructure as Code (IaC)
2
…
Use of IaC
…
IaC Script
Languages to Implement IaC
3
Ansible Chef
Puppet Terraform
Example IaC Script
Include
File mode
Command
File
Reduced provisioning time
1-2 days to 21 minutes
Deployment frequency
1200x improvement
Reduced patch release time
multiple days to 1 hour
5
Use of IaC
Motivation for Secret Management
6
…
7
Secret Management
Motivation for Secret Management
8
Secret Management Tools for IaC
Hiera (Puppet) Ansible Vault (Ansible) Hashicorp Vault
Research Question
9
What practices can be used for secret management in
infrastructure as code scripts?
Search
Artifacts
Apply Inclusion
Criteria
Apply Open
Coding
Mine
Practices
Methodology
Results
11
- 38 Internet Artifacts
- 86.8% of them are blog posts
- 12 practices
Results (Practices)
12
 Data organization (11):
Directories, Hiera for Puppet, Naming
Conventions
 Password Management for Ansible Vault (9):
Vault separation, CLI
Results – Practices (Contd.)
13
 Access Control (6)
 Prioritized Encryption (6)
14
 Separation (4):
Artifact separation, state separation
 Logging (4)
Results – Practices (Contd.)
15
 Unsealing (4):
automation, replication
 Secret rotation (3)
Results – Practices (Contd.)
16
 Applying transport layer security (2)
 Efficient searching (2)
Results – Practices (Contd.)
17
 Speed up (2)
 Limiting authentication (1)
Results – Practices (Contd.)
Results: Mapping Practices to IaC Languages
18
Practice Language
Access control All
Authentication limits All
Data organization All
Environment separation All
Logging All
Password management for Ansible Vault Ansible
Results: Mapping Practices to IaC Languages (Contd.)
19
Practice Language
Prioritized encryption All
Rotation of secrets All
Secret search Puppet
Speedup Ansible
TLS usage All
Unsealing All
Limitations
20
- 38 Internet artifacts
- 6 search strings
- Rater bias
Contributions
21
- 12 practices to manage secrets for IaC scripts
- A mapping of identified practices to secret management tool
Summary
22
arahman@tntech.edu
akondrahman.github.io
@akondrahman
Motivation for Secret Management
6
Search
Artifacts
Apply Inclusion
Criteria
Apply Open
Coding
Mine
Practices
Methodology
14
ü Separation (4):
Artifact separation, state separation
ü Logging (4)
Results – Practices (Contd.)

More Related Content

PPTX
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
PPTX
Characterizing Defective Configuration Scripts Used for Continuous Deployment
PPTX
Under-reported Security Defects in Kubernetes Manifests
PPTX
What Questions Do Programmers Ask About Configuration as Code?
PPTX
Source Code Properties of Defective Infrastructure as Code Scripts
PDF
使用 Elastic Stack 进行端对端安全分析
PPTX
WhiteSource Webinar What's New With WhiteSource in December 2018
PPTX
Application Security Logging with Splunk using Java
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
Characterizing Defective Configuration Scripts Used for Continuous Deployment
Under-reported Security Defects in Kubernetes Manifests
What Questions Do Programmers Ask About Configuration as Code?
Source Code Properties of Defective Infrastructure as Code Scripts
使用 Elastic Stack 进行端对端安全分析
WhiteSource Webinar What's New With WhiteSource in December 2018
Application Security Logging with Splunk using Java

What's hot (20)

PDF
2019 04-04-dev secops-software supply chain_fst-2
PPTX
You Build It, You Secure It: Introduction to DevSecOps
PPTX
ADDO Open Source Observability Tools
PDF
End-to-End Security Analytics with the Elastic Stack
PPTX
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
PPTX
Object Broker Infrastructure for Wide Area Networks
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PDF
Automate Your Container Deployments Securely
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PDF
Automate threat detections and avoid false positives
PDF
Open source cloud native security with threat mapper
PDF
Combining Logs, Metrics, and Traces for Unified Observability
PDF
Get full visibility and find hidden security issues
PDF
Automatize a detecção de ameaças e evite falsos positivos
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PPTX
AllDayDevOps 2019 AppSensor
PDF
Monitoring MongoDB Atlas with Datadog
PDF
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PPTX
Managing Microservices at Scale
2019 04-04-dev secops-software supply chain_fst-2
You Build It, You Secure It: Introduction to DevSecOps
ADDO Open Source Observability Tools
End-to-End Security Analytics with the Elastic Stack
Find Out What's New With WhiteSource May 2018- A WhiteSource Webinar
Object Broker Infrastructure for Wide Area Networks
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
Automate Your Container Deployments Securely
Automating Open Source Security: A SANS Review of WhiteSource
Automate threat detections and avoid false positives
Open source cloud native security with threat mapper
Combining Logs, Metrics, and Traces for Unified Observability
Get full visibility and find hidden security issues
Automatize a detecção de ameaças e evite falsos positivos
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
AllDayDevOps 2019 AppSensor
Monitoring MongoDB Atlas with Datadog
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Stephen Sadowski - Securely automating infrastructure in the cloud
Managing Microservices at Scale
Ad

Similar to Shhh!: Secret Management Practices for Infrastructure as Code (20)

PDF
Data Science with the Help of Metadata
PDF
Learning Hadoop 2 Garry Turkington Gabriele Modena
PDF
Datascience Training with Hadoop, Python Machine Learning & Scala, Spark
PPTX
infrastructure management at digital ages
PPTX
Java EE 7 with Apache Spark for the World’s Largest Credit Card Core Systems ...
PDF
Tiny Batches, in the wine: Shiny New Bits in Spark Streaming
PDF
Running Emerging AI Applications on Big Data Platforms with Ray On Apache Spark
PPTX
DevOps in your Oracle Stack
PDF
Enterprise guide to building a Data Mesh
PPTX
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
PDF
Finding URL pattern with MapReduce and Apache Hadoop
PPT
Apache hadoop and hive
DOC
Wipro-Projects
PDF
Docker interview Questions-3.pdf
PPTX
Cisco OpenSOC
PDF
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
PDF
ThoughtWorks Technology Radar Roadshow - Sydney
PPTX
Intership(Hadoop cluster and DevOps.pptx
PPTX
DevOOPS: Attacks and Defenses for DevOps Toolchains
PDF
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Data Science with the Help of Metadata
Learning Hadoop 2 Garry Turkington Gabriele Modena
Datascience Training with Hadoop, Python Machine Learning & Scala, Spark
infrastructure management at digital ages
Java EE 7 with Apache Spark for the World’s Largest Credit Card Core Systems ...
Tiny Batches, in the wine: Shiny New Bits in Spark Streaming
Running Emerging AI Applications on Big Data Platforms with Ray On Apache Spark
DevOps in your Oracle Stack
Enterprise guide to building a Data Mesh
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Finding URL pattern with MapReduce and Apache Hadoop
Apache hadoop and hive
Wipro-Projects
Docker interview Questions-3.pdf
Cisco OpenSOC
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
ThoughtWorks Technology Radar Roadshow - Sydney
Intership(Hadoop cluster and DevOps.pptx
DevOOPS: Attacks and Defenses for DevOps Toolchains
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ad

More from Akond Rahman (8)

PPTX
How Do Students Feel About Automated Security Static Analysis Exercises?
PPTX
Exercise Perceptions: Experience Report From A Secure Software Development Co...
PPTX
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientifi...
PPTX
Comprehension Effort and Programming Activities: Related? Or Not Related?
PDF
Predicting Android Application Security and Privacy Risk With Static Code Met...
PDF
Which Factors Influence Practitioners' Usage of Build Automation Tools?
PPTX
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
PPTX
Synthesizing Continuous Deployment Practices in Software Development
How Do Students Feel About Automated Security Static Analysis Exercises?
Exercise Perceptions: Experience Report From A Secure Software Development Co...
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientifi...
Comprehension Effort and Programming Activities: Related? Or Not Related?
Predicting Android Application Security and Privacy Risk With Static Code Met...
Which Factors Influence Practitioners' Usage of Build Automation Tools?
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Synthesizing Continuous Deployment Practices in Software Development

Recently uploaded (20)

PPTX
Lecture 5 Software Requirement Engineering
PDF
Microsoft Office 365 Crack Download Free
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PPTX
Computer Software - Technology and Livelihood Education
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PPTX
Download Adobe Photoshop Crack 2025 Free
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PDF
MCP Security Tutorial - Beginner to Advanced
DOC
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
PPTX
Matchmaking for JVMs: How to Pick the Perfect GC Partner
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
Lecture 5 Software Requirement Engineering
Microsoft Office 365 Crack Download Free
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Full-Stack Developer Courses That Actually Land You Jobs
Computer Software - Technology and Livelihood Education
Topaz Photo AI Crack New Download (Latest 2025)
Cybersecurity-and-Fraud-Protecting-Your-Digital-Life.pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Download Adobe Photoshop Crack 2025 Free
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
How to Use SharePoint as an ISO-Compliant Document Management System
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
MCP Security Tutorial - Beginner to Advanced
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
Matchmaking for JVMs: How to Pick the Perfect GC Partner
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
Wondershare Recoverit Full Crack New Version (Latest 2025)

Shhh!: Secret Management Practices for Infrastructure as Code