Тёмный

What is Secrets Management? 

IBM Technology
Подписаться 801 тыс.
Просмотров 16 тыс.
50% 1

Learn more about Cloud Security: ibm.biz/guide-to-cloud-security
Check out IBM Cloud Secrets Manager: ibm.biz/ibm-cloud-secrets-manager
How are you making sure that your secrets are securely stored so that you can avoid data breaches, as well as chaos in your DevOps workflows?
In this lightboard video, Alex Greer with IBM Cloud, visually breaks down what a secret is and how a secrets management service can help to ensure the secure storage of secrets so that you don't have to worry about data breaches from mismanaged credentials.
► Earn a badge with FREE interactive, browser-based Kubernetes labs: ibm.biz/no-cost-kube-browser-b...
Get started on IBM Cloud at no cost: ibm.biz/start-lite-account-today
#SecretsManagement #CloudSecurity #DataBreach

Наука

Опубликовано:

 

22 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 12   
@mycotina6438
@mycotina6438 Год назад
I'm still confused. How does this "request" process to the secret manager happens? In my understanding, the secret manager will only approve the "request" if the requestor can somehow prove that he/she is who he/she claims to be. But, isn't that means we are still dealing with user credentials here? So what does the secret manager really achieve? Is it just adding a centralized layer so that we can easily "revoke" a permission from a particular user to particular service?
@stanleysoman5179
@stanleysoman5179 3 года назад
Thanks for this. Kudos to the PM who thought of this. This feels like a much needed product. Thank you and kudos to the teams for making this happen.
@IBMTechnology
@IBMTechnology 3 года назад
Thank you for watching, Stanley! 🙌
@shayberkovich8104
@shayberkovich8104 3 года назад
The title of the video is somewhat confusing. It mostly goes over the usages of secret management and doesnt even scratch the surface of HOW this is implemented (i.e. HSM). I'd love to see more of latter.
@MBlessing
@MBlessing 2 года назад
I needed this. Does anyone knows a similar secret store manager like the IBM DCM and google secret manager?
@rickharold7884
@rickharold7884 3 года назад
That just kicks the ball down the street one level of indirection. It’s better and you can using the centralized mechanism fix a breach but the client still is the weak link. Thx for the videos. They are all interesting.
@dasaribrahmanaidu6536
@dasaribrahmanaidu6536 3 месяца назад
Requester - AD/Cloiud permission under IAM Policies and protocols - Gaining level of acesss - 9 Minutes Clip ?
@truthexclusive9769
@truthexclusive9769 3 года назад
I need to login via single sign on Application. Prompts network credentials on this single sign on Page. What if I create synthetic ID(user/pwd)? Store them in Secret Mgr. I still would need user and password to login to SSO App for Automated Testing . Only difference is I now get the credentials calling SMS? 🤔 Is this ok Data Breach ?
@IBMTechnology
@IBMTechnology 3 года назад
Hey there! Depends on the secrets service you use. Ideally, if it is integrated with that SSO app then the app can ask that secrets manager service to confirm that user (based on ID) has the right access to these credentials without having to ever expose them outside of your secrets store. Some sort of abstracted value like a key could supplement for any value exposure, reduces exposure for data breach.
@hamdansajid
@hamdansajid 3 года назад
awesome
@hamdansajid
@hamdansajid 3 года назад
what is microservices
@IBMTechnology
@IBMTechnology 3 года назад
Hey Hamdan! 😃 This video might answer your question 👉 ibm.co/338sNtT You can also learn more about microservices in this guide: ibm.co/3l6Jqwz
Далее
What is edge computing?
10:40
Просмотров 239 тыс.
Containerization Explained
8:09
Просмотров 709 тыс.
Smart Sigma Kid #funny #sigma #comedy
00:26
Просмотров 3,5 млн
БАССЕЙНЫ ПО ЦВЕТАМ ЧЕЛЛЕНДЖ !
38:20
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
NAT and Firewall Explained
9:24
Просмотров 98 тыс.
How to Properly Manage Application Secrets (5 LEVELS)
8:13
Cybersecurity and Zero Trust
17:59
Просмотров 79 тыс.
API vs. SDK: What's the difference?
9:21
Просмотров 1,4 млн
AWS Secrets Manager Service Overview with Demo
24:12
Просмотров 34 тыс.
iPhone, Galaxy или Pixel? 😎
0:16
Просмотров 827 тыс.
Choose a phone for your mom
0:20
Просмотров 7 млн