Supporting tools and technologies
In this section, we will take a look at the tools and technologies that might help us build a secure CI/CD infrastructure. We will take a look at the following tools and technologies:
- Central authentication
- Secrets management
- Policy enforcement controllers
- Auditing
Given the things we discussed previously, these tools and technologies might help us avoid some of the issues we discussed. However, they are not silver bullets and you should always make sure that you’re using them in the right way. Let’s take a look at the different tools and technologies.
Central authentication/identity management
In the example we used in Figure 8.1, we are dependent on lots of components, all of which might need all the necessary credentials. Think of a scenario where the password of one user is compromised and you have to change it, or a user leaves the company. Each of these cases causes lots of work and with a rising...