Phone Number +1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

Can Your Secrets Management System Keep a Secret?

mm

Written by Barbara Hoffman

March 4th, 2021

There are many different types of secrets in a digital enterprise.

Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure.

Secrets management keeps all secrets safe, prevents secret sprawl, and ensures systems can connect instantly to accomplish automated tasks. Specifically, secrets management enables you to control how secrets are stored and transmitted, when they’re used, how frequently they’re rotated, and how easily they’re revoked. With secrets management, you make it more difficult for the bad guys to use your secrets against you.

Read on to learn what secrets and secrets management are, what they do, why they’re important, and how you can apply this knowledge to protect your organization.

What is a Secret?

Put simply, a secret is a digital authentication credential.

When we first launched Secret Server over a decade ago, Thycotic chose the word “secret” to apply to all types of digital credentials, not just passwords. “Secret” has since become a standard term, used by everyone in the PAM industry.

The most well-known example of a secret is a password

Secrets are individually named sets of sensitive information, and address a broad spectrum of secure data. There are many kinds of secrets, including user passwords, application and database passwords, auto-generated encryption keys, private encryption keys, API keys, application keys, SSH keys, authorization tokens, and private certificates (e.g. TLS, SSL). Each type of secret is well suited to a particular use, whether storing information at rest, or in transit, or granting access to sensitive, business-critical IT resources.

The most well-known example of a secret is a password, used to log in to an application, website, or endpoint. But these types of secrets aren’t the most common, nor are they the most difficult secrets to secure.

Secrets used by non-humans are ubiquitous yet invisible, essential to cyber security yet underappreciated.

Modern applications, whether hosted in the cloud or on premise, have accelerated the need for all types of digital secrets. Application-to-application secrets are increasing exponentially. These are used to encrypt data when it’s transferred between applications—like sending information from a web page, making a secure request to an API, accessing a cloud database, or countless other cases which modern enterprises encounter as they pursue digital transformation and increase automation.

With so many types of secrets used in so many contexts, it’s easy to lose track of them or apply them consistently across the enterprise. That’s where secrets management comes in.

What is Secrets Management?

Secrets management embeds security controls within the highest-risk layers of a modern organization’s infrastructure: Clouds, Code, Data, and Devices.

Cloud: In the past year, 77% of cloud breaches involved compromised credentials, as reported in the 2020 Verizon Data Breach Report. Secrets management addresses SaaS, LaaS, PaaS, private and hybrid multi-cloud scenarios.

Code: Rapid development practices require rapid PAM practices. Secrets management provides dev teams on-demand access to applications and databases to administer changes without compromising security or production credentials. It eliminates the need to embed secrets in code or external repositories like Github.

Data: Secrets management protects access and usage of sensitive data, personal data, and intellectual property stored and shared within databases and applications.

Devices: 85% of cyber attacks enter through compromised endpoints, according to SANS. Secrets management protects secrets used to access devices such as user workstations, laptops, and servers.

Secrets Lifecycle

Most people know what they need to do to stay physically and mentally fit, but sometimes they cut corners or skip steps entirely, and their long term-health suffers.

The same can be said of the secrets lifecycle.

Once a secret is created, it’s not always managed properly. It may never be rotated and may be very difficult to revoke. Most secrets do not age well.

Secrets management is the process of managing secrets in a secure and centralized manner, throughout the secrets lifecycle.

A healthy secret should follow a lifecycle like this:

  • Generation / creation: The secret is created, either manually by a user or automatically as needed. Passwords will often, but not always, need to conform to a policy governing their make-up and use. (More on that below.) Automatically generating credentials removes one of the key weaknesses of secrets management: human-generated credentials tend to be easier to crack than computer-generated ones.
  • Rotation: Once in use, a secret should be changed on a regular schedule. This is often specified and required by different standards, such as PCI DSS which mandates a maximum 90-day rotation cycle. It can take the form of automatically regenerating a new secret on a schedule, or of prompting for manual creation. If a secret is stale or expired, access is denied until it is updated.
  • Revocation: The ability to remove credentials from a user or application, thus denying access to a resource, is so important that it’s enshrined in many security policy standards, such as NIST 800-53. Secret revocation can be used when an employee leaves a company or anomalous behavior is detected. Pruning unneeded, expired, breached or weak secrets is an essential step in good secrets hygiene.

To manage secrets throughout their lifecycle, any PAM system you choose must be able to store and serve up secrets when needed, as well as provide you visibility and policy-based control from end to end.

Why is Secrets Management Important?

Secrets management enables you to securely store, transmit, and audit secrets. It removes, or at least minimizes, the involvement of humans in the management of secrets to reduce potential points of failure. This systematic approach to preventing unauthorized access to sensitive data and systems helps you avoid data breaches, data and identity theft or manipulation.

A strong secrets policy helps mitigate these common challenges:

  • Sharing secrets with other users
  • Reusing secrets, either out of expediency or because the passwords are hardcoded or embedded within applications and systems
  • Weak secret storage, such as storing secrets unencrypted or in plain text
  • No secret rotation, which could be a side effect of having hardcoded or embedded secrets
  • No secret revocation

Secrets management prevents secrets sprawl

As the volume, diversity, and complexity of your IT systems increase, it’s harder to implement and manage a consistent policy across all of them, and know where secrets are and how they’re used. Secrets sprawl is the insidious condition in which an organization loses track of its credentials, succumbing to a patchwork of management systems, each with its own management policy. There are many ways to manage secrets, and when each application, cloud provider, or organization department has its own security model, the organization as a whole loses visibility.

Secrets policies need to be set and managed centrally to ensure they are applied consistently defining the rules for how secrets are handled at each stage of their lifecycle.

Secrets Management Best Practices

These are the key tenets of a well-run secrets management system:

  • Discover secrets. Take the time to uncover all of the secrets used throughout your organization. Then, secure them.
  • Create a single, comprehensive secrets management policy. The policy should set strict rules around the structure of secrets (minimum length, complexity, use of special characters, forbidden passwords, reuse, duration) while restricting the use of default or hardcoded secrets.
  • Automate the secrets management process. Remove the human element from the mix. Eliminate hardcoded and embedded secrets. Rely on systems, not people, to create, manage, distribute, and maintain secrets.
  • Enforce secrets policies. You’ve taken the time to create a policy, so enforce it. Require that applications and users comply with rules related to secret strength, rotation, reuse, and revocation. Don’t trust. Always verify. Don’t set it and forget it. Set up session monitoring and regularly review audit logs.
  • Separate data from the secrets. Use the distributed nature of today’s networks to your advantage. Rather than concentrating both secrets management and sensitive data in the same location, keep them apart.

How Thycotic Secrets Management Can Help

Modern PAM needs to secure every secret and privileged object within the enterprise no matter where they reside—on-prem systems, multi-cloud layers, and devices—by embedding security controls within the highest-risk layers: Clouds, Code, Data, and Devices.

  • Secret Server manages secrets throughout the end-to-end lifecycle, including creation, storage, rotation, revocation, and auditing.
  • DevOps Secrets Vault is designed for high-velocity secrets management in DevOps, RPA, and other automation scenarios. DevOps teams stay productive by automating secrets creation and ensuring ongoing security.

You can use secrets management solutions like these to keep your secrets safe, so they can’t be used against you.

Browser-stored passwords make it easy for hackers to get inside your network.

Pinpoint risky stored passwords in minutes

Our free Browser-Stored Password Discovery Tool finds those sneaky passwords

 

Like this post?

Get our top blog posts delivered to your inbox once a month.

SHARE THIS