US 11,750,615 B1
Securing development and operations pipelines
Gil Adda, Petach-Tikva (IL); Daniel Schwartzer, Petach-Tikva (IL); Yoel Yaffe, Petach-Tikva (IL); and Erez Waisbard, Petach-Tikva (IL)
Assigned to CyberArk Software Ltd., Petach-Tikva (IL)
Filed by CyberArk Software Ltd., Petach-Tikva (IL)
Filed on Sep. 30, 2022, as Appl. No. 17/937,300.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/101 (2013.01) 24 Claims
OG exemplary drawing
 
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for securely handling secrets within a development and operations pipeline, the operations comprising:
identifying a network access request for a process within the development and operations pipeline;
accessing a result of at least one investigation, wherein the at least one investigation includes at least one of:
monitoring the process behavior,
performing a process attestation, or
performing an inspection of the network access request;
determining, based on the result of the at least one investigation, whether to authorize the network access request; and
conditional on whether the network access request is authorized, dynamically injecting a decrypted or unencrypted secret into the network access request, wherein the secret is not made available to the process itself and the secret is encrypted after the injection.