What is Secrets Management?

  Рет қаралды 15,974

IBM Technology

IBM Technology

Күн бұрын

Learn more about Cloud Security: ibm.biz/guide-to-cloud-security
Check out IBM Cloud Secrets Manager: ibm.biz/ibm-cloud-secrets-manager
How are you making sure that your secrets are securely stored so that you can avoid data breaches, as well as chaos in your DevOps workflows?
In this lightboard video, Alex Greer with IBM Cloud, visually breaks down what a secret is and how a secrets management service can help to ensure the secure storage of secrets so that you don't have to worry about data breaches from mismanaged credentials.
► Earn a badge with FREE interactive, browser-based Kubernetes labs: ibm.biz/no-cost-kube-browser-b...
Get started on IBM Cloud at no cost: ibm.biz/start-lite-account-today
#SecretsManagement #CloudSecurity #DataBreach

Пікірлер: 12
@mycotina6438
@mycotina6438 Жыл бұрын
I'm still confused. How does this "request" process to the secret manager happens? In my understanding, the secret manager will only approve the "request" if the requestor can somehow prove that he/she is who he/she claims to be. But, isn't that means we are still dealing with user credentials here? So what does the secret manager really achieve? Is it just adding a centralized layer so that we can easily "revoke" a permission from a particular user to particular service?
@stanleysoman5179
@stanleysoman5179 3 жыл бұрын
Thanks for this. Kudos to the PM who thought of this. This feels like a much needed product. Thank you and kudos to the teams for making this happen.
@IBMTechnology
@IBMTechnology 3 жыл бұрын
Thank you for watching, Stanley! 🙌
@shayberkovich8104
@shayberkovich8104 3 жыл бұрын
The title of the video is somewhat confusing. It mostly goes over the usages of secret management and doesnt even scratch the surface of HOW this is implemented (i.e. HSM). I'd love to see more of latter.
@rickharold7884
@rickharold7884 3 жыл бұрын
That just kicks the ball down the street one level of indirection. It’s better and you can using the centralized mechanism fix a breach but the client still is the weak link. Thx for the videos. They are all interesting.
@dasaribrahmanaidu6536
@dasaribrahmanaidu6536 3 ай бұрын
Requester - AD/Cloiud permission under IAM Policies and protocols - Gaining level of acesss - 9 Minutes Clip ?
@MBlessing
@MBlessing 2 жыл бұрын
I needed this. Does anyone knows a similar secret store manager like the IBM DCM and google secret manager?
@truthexclusive9769
@truthexclusive9769 3 жыл бұрын
I need to login via single sign on Application. Prompts network credentials on this single sign on Page. What if I create synthetic ID(user/pwd)? Store them in Secret Mgr. I still would need user and password to login to SSO App for Automated Testing . Only difference is I now get the credentials calling SMS? 🤔 Is this ok Data Breach ?
@IBMTechnology
@IBMTechnology 3 жыл бұрын
Hey there! Depends on the secrets service you use. Ideally, if it is integrated with that SSO app then the app can ask that secrets manager service to confirm that user (based on ID) has the right access to these credentials without having to ever expose them outside of your secrets store. Some sort of abstracted value like a key could supplement for any value exposure, reduces exposure for data breach.
@hamdansajid
@hamdansajid 3 жыл бұрын
awesome
@hamdansajid
@hamdansajid 3 жыл бұрын
what is microservices
@IBMTechnology
@IBMTechnology 3 жыл бұрын
Hey Hamdan! 😃 This video might answer your question 👉 ibm.co/338sNtT You can also learn more about microservices in this guide: ibm.co/3l6Jqwz
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 79 М.
Understanding AWS Secrets Manager - AWS Online Tech Talks
33:50
AWS Developers
Рет қаралды 99 М.
How Many Balloons Does It Take To Fly?
00:18
MrBeast
Рет қаралды 151 МЛН
API vs. SDK: What's the difference?
9:21
IBM Technology
Рет қаралды 1,4 МЛН
Our Journey Into Secrets Management With Vault
27:52
HashiCorp
Рет қаралды 1,4 М.
What is edge computing?
10:40
IBM Technology
Рет қаралды 239 М.
AWS Secrets Manager Service Overview with Demo
24:12
Be A Better Dev
Рет қаралды 34 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 108 М.
Social Engineering - How Bad Guys Hack Users
14:58
IBM Technology
Рет қаралды 47 М.
How to Manage Secrets in Terraform?
15:54
Anton Putra
Рет қаралды 24 М.
Observability Explained with LogDNA
8:16
IBM Technology
Рет қаралды 20 М.
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
VA-PC
Рет қаралды 2 МЛН
Здесь упор в процессор
18:02
Рома, Просто Рома
Рет қаралды 362 М.
تجربة أغرب توصيلة شحن ضد القطع تماما
0:56
صدام العزي
Рет қаралды 56 МЛН