Download pdf
DevOps automation and everything-is-code approach to app development, continuous integration and deployment results in a proliferation of privileged credentials across the DevOps environment, resulting in an extensive attack surface. This session will discuss how to lock down privileged credentials used as part of the deployment lifecycle rather than an afterthought.