{"id":45040,"date":"2022-04-07T09:31:36","date_gmt":"2022-04-07T01:31:36","guid":{"rendered":"https:\/\/version-2.com\/?p=45040"},"modified":"2022-05-30T10:42:16","modified_gmt":"2022-05-30T02:42:16","slug":"achieving-devsecops-through-pam","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/04\/achieving-devsecops-through-pam\/","title":{"rendered":"Achieving DevSecOps through PAM"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"45040\" class=\"elementor elementor-45040\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><span style=\"font-weight: 400;\">DevsecOps is the abbreviation for <\/span><i><span style=\"font-weight: 400;\">development, security, and operations <\/span><\/i><span style=\"font-weight: 400;\">and has gained a lot of attention among the best methodologies for software development. According to Gartner, by the end of 2021, DevSecOps practices will be implemented in 60% of agile Development teams, compared to 20% in 2019. DevSecOps practices prioritize cooperation, collaboration, and responsibility-sharing among information security teams.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Privileged access management (Pam), on the other hand, obeys the principle of least privilege, avoiding cyberattacks carried out through privileged credentials, such as breaches and data leaks, and can help achieve DevSecOps throughout software development.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we cover these concepts and their implications more deeply. To make your understanding easier, our text is divided by topics:<\/span><\/p>\n<ol>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>About DevSecOps<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advantages of the DevSecOps Method<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>About PAM<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b style=\"font-size: 18px;\">The Importance of PAM to Organizations<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b style=\"font-size: 18px;\">How PAM can Contribute to DevSecOps<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b style=\"font-size: 18px;\">Conclusion<\/b><\/li>\n<\/ol>\n<\/ol>\n<span style=\"font-weight: 400;\">Follow our text to the end!<\/span><\/p>\n\n<ul>\n<li aria-level=\"1\">\n<h2><b>About DevSecOps<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">DevSecOps is a way to integrate security practices into the DevOps process, which provides launch engineers and security teams working collaboratively through agile software development methodologies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DevSecOps aims to develop new solutions for<\/span> <span style=\"font-weight: 400;\">complex software development processes in an agile and secure way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is a solution to the old security methodologies in the continuous delivery <\/span><i><span style=\"font-weight: 400;\">pipeline <\/span><\/i><span style=\"font-weight: 400;\">nowadays, which aims to promote the fast and secure delivery of codes. In this case, silo thinking is replaced by a process that favors communication, cooperation, and sharing of security tasks during the stages of the delivery process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In DevSecOps, it is possible to bring together two seemingly opposite purposes, secure code and speed of delivery, through a facilitated process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aligned with the mechanisms of Agile, security tests, in this case, are performed in iterations, avoiding delaying delivery. In this way, security problems can be solved as soon as they are identified, even before compromising the results.<\/span><\/p>\n\n<ul>\n<li aria-level=\"1\">\n<h2><b>Advantages of the DevSecOps Method<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In<\/span> <span style=\"font-weight: 400;\">DevSecOps, it is possible to bring together two seemingly opposite purposes, secure code and speed of delivery, through a facilitated process. Thus, one can take advantage of the resources of agile methods and create secure codes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to an EMA report released in 2017, the two biggest advantages of security operations are improved operational efficiency in IT, including security, and improved ROI in security infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same study found another important benefit: the possibility of using 100% of cloud services. Other known advantages of DevOps that are inherited by DevSecOps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Better communication and collaboration between teams;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">More agile security teams;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Possibility of responding to demands and changes quickly; and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">More opportunities to perform automated builds and quality testing.<\/span><\/li>\n<\/ul>\n\n<ul>\n<li aria-level=\"1\">\n<h2><b>About PAM<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Privileged access management (Pam) has the function of protecting organizations against threats such as theft of credentials and misuse of privileges.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It consists of an information security strategy that involves users, as well as processes and technology to monitor, protect, control, and audit the privileged activities in the IT structure of a company.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also known as privileged access security (PAS) and privileged identity management (PIM), PAM considers the principle of least privilege, respected when users receive only the credentials necessary to perform their corporate tasks.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This cybersecurity practice is of paramount importance for protecting privileged access to valuable data. With it, you can reduce the attack surface and minimize the risk of <\/span><b>data breaches<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n<ul>\n<li aria-level=\"1\">\n<h2><b>The Importance of PAM to Organizations<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">One of the biggest vulnerabilities for IT structures is human action, including privileged users who go beyond their access level and invaders who appropriate these privileges to operate.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this sense, the importance of PAM for organizations is to enable the identification of malicious actions by security teams and ensure employees have only the required access to perform their work, as mentioned in the previous topic.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, companies that adopt PAM as a cybersecurity mechanism achieve several advantages, such as minimizing security risks, reducing their surface area of cyberattacks, reducing operating costs, and achieving compliance with strict data protection policies, such as the LGPD.<\/span><\/p>\n\n<ul>\n<li aria-level=\"1\">\n<h2><b>How PAM Can Contribute to DevSecOps<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By reading the previous topics, you can see the importance of PAM for cybersecurity. Here\u2019s how this approach can contribute to DevSecOps throughout the software development cycle:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PAM makes it possible to scan the <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">spread throughout the DevOps development <\/span><i><span style=\"font-weight: 400;\">pipeline<\/span><\/i><span style=\"font-weight: 400;\">, which is essential for companies to understand where information and credentials are being stored, and who is performing each action at which time. This visibility allows one to assess the security of the IT environment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It also makes it possible to manage shared <\/span><i><span style=\"font-weight: 400;\">secrets <\/span><\/i><span style=\"font-weight: 400;\">and passwords embedded in codes, allowing one to trace actions in the IT environment. This is critical to software integrity and compliance with security policies.&nbsp;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The adoption of its concepts involves providing individual users or specific service accounts with the number of privileges needed to perform their tasks. In this way, it is possible to ensure the environment as a whole is not compromised if an account or process is compromised.<\/span><\/li>\n<\/ul>\n\n<ul>\n<li aria-level=\"1\">\n<h2><b>Conclusion<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In our article, you learned that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DevSecOps integrates security practices into the DevOps process in a collaborative way, which favors communication and responsibility-sharing;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This approach makes it possible to gather secure codes and delivery speed, through a facilitated process;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In DevSecOps, security mechanisms are incorporated into the development process;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PAM aims to protect organizations against threats;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One of the greatest vulnerabilities for IT structures is human action, which justifies the application of PAM;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This tool allows the organization to comply with strict data protection policies; and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PAM contributes to DevSecOps in the software development cycle, allowing one to understand where information and credentials are stored, and who executes (and when).&nbsp;<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Was this content useful for you? Share it with someone else who may also be interested in the topic.<\/span><\/p>\n<\/p>\n<p><b>ALSO READ IN SENHASEGURA\u2019S BLOG<\/b><\/p>\n<p><a href=\"\/en\/2021\/04\/lgpd-know-what-your-company-needs-to-do-by-august\/\"><span style=\"font-weight: 400;\">Learn All About Passwordless Authentication<\/span><\/a><\/p>\n<p><a href=\"\/en\/2022\/03\/ssh-keys-learn-more-about-the-importance-of-secure-control\/\"><span style=\"font-weight: 400;\">SSH Keys: Learn More About the Importance of Secure Control<\/span><\/a><\/p>\n<p><a href=\"\/en\/2022\/02\/sql-injection-how-to-avoid-it-and-protect-your-systems\/\"><span style=\"font-weight: 400;\">SQL Injection: How to Avoid It and Protect Your Systems<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>DevsecOps is the abbreviation for development, security [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-45040","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Achieving DevSecOps through PAM - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving DevSecOps through PAM - Version 2\" \/>\n<meta property=\"og:description\" content=\"DevsecOps is the abbreviation for development, security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-07T01:31:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/achieving-devsecops-through-pam\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Achieving DevSecOps through PAM\",\"datePublished\":\"2022-04-07T01:31:36+00:00\",\"dateModified\":\"2022-05-30T02:42:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/achieving-devsecops-through-pam\\\/\"},\"wordCount\":982,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Achieving-DevSecOps-through-PAM.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/achieving-devsecops-through-pam\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/\",\"name\":\"Achieving DevSecOps through PAM - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Achieving-DevSecOps-through-PAM.jpg\",\"datePublished\":\"2022-04-07T01:31:36+00:00\",\"dateModified\":\"2022-05-30T02:42:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Achieving-DevSecOps-through-PAM.jpg\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Achieving-DevSecOps-through-PAM.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/achieving-devsecops-through-pam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving DevSecOps through PAM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Achieving DevSecOps through PAM - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/","og_locale":"en_US","og_type":"article","og_title":"Achieving DevSecOps through PAM - Version 2","og_description":"DevsecOps is the abbreviation for development, security [&hellip;]","og_url":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/","og_site_name":"Version 2","article_published_time":"2022-04-07T01:31:36+00:00","article_modified_time":"2022-05-30T02:42:16+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/achieving-devsecops-through-pam\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Achieving DevSecOps through PAM","datePublished":"2022-04-07T01:31:36+00:00","dateModified":"2022-05-30T02:42:16+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/achieving-devsecops-through-pam\/"},"wordCount":982,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/achieving-devsecops-through-pam\/","url":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/","name":"Achieving DevSecOps through PAM - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg","datePublished":"2022-04-07T01:31:36+00:00","dateModified":"2022-05-30T02:42:16+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/03\/Achieving-DevSecOps-through-PAM.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/achieving-devsecops-through-pam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Achieving DevSecOps through PAM"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-bIs","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/45040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=45040"}],"version-history":[{"count":6,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/45040\/revisions"}],"predecessor-version":[{"id":45046,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/45040\/revisions\/45046"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=45040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=45040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=45040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}