Security tools often mistake providing visibility for mitigating risks, but visibility is only half the battle. Eliminating those risks is the hard work of Security and DevSecOps teams. At Arnica, we believe that every risk identified should come with an actionable fix – rather than just providing a “to-do” list.
Addressing operational and security risks that exist in developer tools and code repositories is challenging. As a result, operators faced with mitigating these types of risks often deprioritize them due to their complexity or the chance that they will make a mistake in mitigating them. Those mistakes, when made, create even more work as teams must now address both the error and the original issue. Not just a dashboard
And while all security tools aim to identify risks within their focus area, most tools either stop there or create tickets (read: laundry lists) for tracking the issues that are identified. Maybe they provide steps to find the risk and fix it elsewhere, but rarely do they resolve the risk proactively from within the tool itself.
At Arnica, we aim to attach each risk that we surface with one-click mitigation.
In order to do this, Arnica built rich integrations into existing software supply chain tools, giving us the ability to identify and mitigate risks where they exist.
When we set out to build Arnica, we had a number of outcomes in mind for our users:
A developer has write-access to a repository that she has not pushed code to in 90 days. Arnica will automatically reduce permissions to least-privilege. Should that developer need permissions to this repository in the future, they can request permissions by typing /arnica into Slack, using the Arnica bot. Based on the policy set within Arnica and the context of the request, permissions will either be automatically granted or flagged for manual review.
A developer account submits a PR with a coding style that does not match their standard patterns. Arnica will identify the anomalous code or developer behavior and notify the author (or manager, depending on policy) that an anomaly has been detected. Arnica will ask the author (or manager) to attest to whether the PR was in fact submitted by them, or not adding an additional factor of authentication.
A secret is identified in a pull request. Arnica will freeze the PR that was submitted with an identified secret and clone the PR in a new branch with that secret removed. Then Arnica will send the committing developer a Slack message letting them know that a secret was detected in their code and giving them the option to push the cloned PR (without the secret) and delete the previous PR (with the secret).
Enterprises today are faced with the need to harden their DevOps ecosystem to combat the proliferation of Software Supply Chain Attacks. These organizations are faced with the growing challenge of balancing development velocity, cost efficiency, and security.
Managing excessive developer permissions and identifying corresponding anomalous behavior are two obstacles in the way of establishing this equilibrium. Arnica was established to solve these obstacles by providing a seamless and frictionless active mitigation platform for exactly these issues and more. Arnica is the easy button for DevOps security.
Arnica analyzes excessive permissions, code risks and misconfigurations across the developer toolset and mitigates them.