Blogs

Zero-Trust Network Access Platforms Slash DevOps Bottlenecks

In a prior article, I indicated why a new remote zero-trust platform is needed to support DevOps teams.

Traditional remote access configurations are not well-suited for DevOps given a shifting user population comprised of employees, contractors and other third parties often using their own devices; the large number of tools and systems to which access must be provided and the hybrid nature of the infrastructure itself (on-premises, hybrid and multi-cloud).

DevOps Pain Points

Three pain points are associated with traditional approaches when used with DevOps.

1. DevOps user experience is poor in traditional remote access configurations. Each DevOps service must be accessed as separate secured sessions, which is confusing and tedious.
2. System management requires IP whitelisting rules in VPN, static SSH keys in Bastion, firewall rules controlled by different teams and application-specific authentication. The coordination and execution of so many touchpoints for common actions—including the onboarding of new team members, changing roles or adding a new service—invites mistakes that cause productivity issues and introduces unforeseen security holes.
3. Security is complex and error-prone. DevOps users must be granted restricted access to the individual services they need to be productive. Administering restricted access for individuals and groups is time-consuming. Security policies typically require monitoring detailed audit logs of user access.

How a Zero-Trust Remote Access Platform Works with DevOps

In my whitepaper, Zero-Trust-Remote Access-For-DevOps, I explain how a zero-trust remote access platform can resolve the requirements for improved DevOps user experience, consistent and manageable administration and simplified, less error-prone security.

Improved DevOps User Experience

By replacing the need for the user to tediously set up separate sessions for each DevOps service they need to use, a client-side DevOps service catalog enables all DevOps services to be accessed with a single click. This service catalog approach is more convenient for DevOps users and provides a form of DevOps governance. It does this by encouraging DevOps teams to select choices that are available in the catalog instead of creating new choices that result in expensive DevOps tool sprawl.

Simplified DevOps Management

Management of remote DevOps users is simplified by consolidating access for all DevOps users and services under a single unified service manager and connector. The need to manage each user and service with different teams, each with their own processes, is unified and streamlined when the management requirements for DevOps users and services are consolidated under a common zero-trust remote access platform.

In addition, this approach makes it much easier to implement more adaptive policies across the breadth of users and services.

With a zero-trust remote access platform, onboarding new DevOps users and groups is accomplished within a single session—not separate sessions for each onboarding requirement.

Simplified and Less Error-Prone Security

Consolidating access to DevOps services under a common zero-trust remote access platform with unified services and services connectors enables simplified and less error-prone security controls, improved security monitoring and policy management. Audit logs of access are reported consistently for all services. Monitoring and changing access rules can be supported for individuals or groups when adjusting a policy. Trust-based access controls can be implemented consistently. Granular policies ensure access is predicated on appropriate device trust score thresholds being met. Rather than a single check prior to granting access, these production services policies continuously assess the security of the users and devices accessing the services.

Transforming to a Zero-Trust Remote Access platform for DevOps

Transformations of all types, and especially those for DevOps, are made more certain by following a
seven-step transformation process, described in my book Engineering DevOps. This process serves as a framework for implementing the zero-trust remote access platform.

The first two steps, vision and team alignment, involve getting the leaders, key influencers and implementers of an organization to recognize and establish actionable goals for the implementation of the zero-trust remote access platform.

The third step, assessment, requires taking inventory of the current state of DevOps users, DevOps services and policies that need to be supported by the new platform.

The fourth step, road map, requires determining the plan for implementation. Typically, it makes sense to start with one application. Start with a set of DevOps users and DevOps services needed for a single application or pipeline which can serve as a model to drive adoption to other applications as the solution is proved and accepted.

The fifth step, realize, is the step in which the zero-trust remote access platform is installed and set up for the initial model application or pipeline. Banyan Security explains how an example tool vendor helps to simplify this step.

Capabilities to look in for in zero-trust remote access tools include:

• Deploys in minutes, with no integration requirements on any existing DevOps services or infrastructure.
• No need to set up VPNs, open inbound firewall ports or manage DNS.
• Use existing DevOps user devices without diminishing security.
• DevOps service catalog provides users visibility and one-click access to DevOps services.
• Support for bundled services, favorites, and autorun capabilities.

In step six, operationalize, the procedures for commissioning and using the zero-trust remote access platform are proven, benefits are measured and playbooks are hardened for the organization.

In step seven, expansion, the zero-trust remote access platform deployment is expanded to other DevOps applications pipelines, DevOps users and DevOps services across the enterprise.

What This Means

Traditional remote access configurations are not well suited for DevOps administrators or users given the dynamic nature of services, team members, and environments. A zero-trust remote access platform addresses the need for an improved DevOps admin and user experience, simplified access management to DevOps services and simpler, less error-prone security practices and monitoring.


I want to express my appreciation for the time spent with the Banyan Security team, who has pioneered many of the concepts outlined in this blog and contributed valuable insight.

Marc Hornbeek

Marc Hornbeek, a.k.a., DevOps-the-Gray, is CEO and Principal Consultant at Engineering DevOps Consulting , author of the book "Engineering DevOps" , and Ambassador of The DevOps Institute. Marc is a specialist / expert at applying a deep knowledge of engineering practices to DevOps, QA, DevSecOps and SRE transformations. Marc applies his unique, comprehensive Engineering Blueprints, Seven-Step DevOps Transformation Blueprint and Nine Pillars of DevOps / QE / DevSecOps / SRE discovery and assessment tools, together with targeted workshops to create actionable and comprehensive DevOps transformation roadmaps and strategic plans. Marc is an IEEE Outstanding Engineer, and 47-year Life Member of IEEE. He is a DevOps leadership advisor/mentor. He is the original author of the DevOps Engineering Foundation, Continuous Delivery Ecosystem Foundation (CDEF) and Continuous Test Foundation (CTF) certification courses that are offered by global training partners of the DevOps Institute. He is a Blogger on DevOps.com, CloudNativeNow.com, and SeurityBlvd.com. He is a freelance writer of DevOps content including eBooks, webinars, and white papers. . His education includes engineering and executive business degrees and nine certifications from the DevOps Institute. Email Marc for DevOps / QE / DevSecOps / SRE consulting, training, writing and speaking engagements at mhornbeek@engineeringdevops.com, call him at +1 805 908 5789 or use this link to book a live 20 minute chat. https://calendly.com/engineeringdevops/devopschat

Recent Posts

Valkey is Rapidly Overtaking Redis

Redis is taking it in the chops, as both maintainers and customers move to the Valkey Redis fork.

12 hours ago

GitLab Adds AI Chat Interface to Increase DevOps Productivity

GitLab Duo Chat is a natural language interface which helps generate code, create tests and access code summarizations.

16 hours ago

The Role of AI in Securing Software and Data Supply Chains

Expect attacks on the open source software supply chain to accelerate, with attackers automating attacks in common open source software…

22 hours ago

Exploring Low/No-Code Platforms, GenAI, Copilots and Code Generators

The emergence of low/no-code platforms is challenging traditional notions of coding expertise. Gone are the days when coding was an…

2 days ago

Datadog DevSecOps Report Shines Spotlight on Java Security Issues

Datadog today published a State of DevSecOps report that finds 90% of Java services running in a production environment are…

2 days ago

OpenSSF warns of Open Source Social Engineering Threats

Linux dodged a bullet. If the XZ exploit had gone undiscovered for only a few more weeks, millions of Linux…

3 days ago