Skip to main content
banner image
venafi logo

Robotic Process Automation (RPA): The Importance of Securing Bot Certificates for Federal Agencies

Robotic Process Automation (RPA): The Importance of Securing Bot Certificates for Federal Agencies

picture of a vintage blue toy robot, from the chest up
December 2, 2019 | Guest Blogger: Anastasios Arampatzis


Over the past years there has been intensifying interest

in robotics and automation. The potential for these technologies to reduce costs and jobs has been highlighted. Deloitte’s research has demonstrated that, while technology contributed to the loss of 800,000 jobs between 2001 and 2015, in the same period it helped create 3.5m new jobs which, on average, were higher skilled and higher paid. The job landscape in the future will be dramatically different. In parallel with moving to greater use of robotics and automation, businesses need to reimagine the shape and role of their human workforce.
 


The Robots Are Ready. Are You?

Robotic Process Automation (RPA), often referred to as ‘robotics’ or ‘robots’, is defined as the software automation of rules-based processes that utilizes the user interface and which can run on any software, including web-based applications, ERP systems and mainframe systems. Therefore, RPA is a computer-coded software, that replaces humans performing repetitive rules-based tasks.

RPA solutions have existed for over a decade, but with recent advancements in technology, they have seen wider deployment in businesses today and have been encouraged by the Office of Management and Budget (OMB) as a potential solution to redirect limited resources to accomplish mission outcomes that matter most to citizens.

 

 

Deloitte invited organizations globally to take part in an online survey on their use of RPA. The key findings of this survey are included in the report “The robots are ready. Are you?”. According to the survey, continuous improvement and automation remain top of the strategic agenda for many enterprises: 53% of the respondents have already embarked on the RPA journey and a further 19% of respondents plan to adopt RPA in the next two years. If adoption continues at its current level, RPA will have achieved near-universal adoption within the next five years.
 

RPA is increasingly becoming an enterprise-level opportunity: for 64% of respondents RPA is a strategic or enterprise-wide initiative. This figure has grown significantly over the past year since many organizations that started with function-specific RPA initiatives have grown or consolidated these to take advantage of the broader opportunity across the business.
 

There is an expectation that robots could deliver a significant portion of current transactional activities. This can enable the human workforce to be redeployed to more value adding activities. RPA implementation has an attractive payback period—just under 12 months. As such, organizations are investing in RPA. Among those that have already implemented RPA, 78% expect to significantly increase investment in RPA over the next three years, with those that are piloting RPA planning to spend an average of $1.5m on RPA. Organizations that have implemented or scaled across the enterprise have already invested an average of $3.5m in robotics.
 

RPA continues to outperform expectations on non-financial benefits such as accuracy, timelines, flexibility and improved compliance, with at least 85% of respondents reporting that RPA met or exceeded their expectations in these areas. In addition, a total of 61% reported their expectations of cost reduction being met or exceeded.



Securing Bot Certificates for Federal Agencies

One of the top challenges for the enterprises that have implemented, and scaled RPA is building a strong foundation. “The IT organization is essential in setting up a scalable and secure bot infrastructure” says the Deloitte report.
 

Given the on-going adoption of RPA, securing bots and paying close attention to how they are access systems and data is critical. Existing identity management tools and related security control configurations, such as the implementation of TLS authentication or other multi-factor authentication mechanisms, have proven effective in securing Federal IT systems. Using these technologies, organizations can facilitate secure, auditable access for human and digital users alike.
 

RPA, A New Attack Surface

The adoption of RPA technology introduces a new attack surface for both human and non-human identities, opening the enterprise to the damaging effects of a data breach. If the accounts and credentials leveraged by both RPA admins and this new digital workforce are left unsecured, an attacker can steal them and gain access to your most critical systems, applications and data. Poor bot identity management can result in key risks not only to Federal agencies but to all companies embracing the potentials of RPA. These risks are visualized in the following diagram, courtesy of Deloitte.
 


Figure 1: Key Risks to Bot Identity Management
 

While many RPA solutions may have organic credential managers allowing bots to login to applications, these credentials generally include traditional ‘knowledge-based’ features that leverage usernames and passwords. These credentials are not strong enough to access Federal applications or information that require higher authentication assurance and contain sensitive data in accordance with the FIPS 199 categorization. To accomplish this, machine identities must be issued to enable bot credentialing, authentication and access in accordance with established Federal certificate issuance procedures.
 

One key consideration to consider when issuing bot certificates is that they should contain information that easily identify Non-Person Entities (NPEs) when they attempt to gain access to applications. In fact, OMB Memorandum M-19-17, titled Enabling Mission Delivery through Improved Identity, Credential, and Access Management, compels agencies to ensure the “digital identity is distinguishable, auditable, and consistently managed across the agency”, to include “establishing mechanisms to bind, update, revoke, and destroy credentials for the device or automated technology.” Additionally, human sponsor correlation is required prior to certificate generation to align accountability with potential system misuse. While these two factors are critical in credentialing bots, other significant requirements also deserve careful consideration.
 

Figure 2: Bot Credentialing Considerations. Source: Deloitte


These requirements can be broken into several categories: Policy/Governance, Technical Considerations and Procedural Considerations. All considerations are critical; however, the governance input is the catalyst that provides the necessary guidance for the technical and procedural implementers, allowing a secure and compliant solution to operationalize bot credentialing.


If you want to learn more on how you can secure your bot credentials, contact the experts at Venafi.    


Find out why protecting machine identities matters now more than ever. 


 

 

Related posts

 

Like this blog? We think you will love this.
attaques de décapage ssl
Featured Blog

En quoi consistent les attaques SSL strip ?

  Un peu d'histoire

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

CIO Study: Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

Machine Identity Protection for Dummies
eBook

Machine Identity Protection for Dummies

About the author

Guest Blogger: Anastasios Arampatzis
Guest Blogger: Anastasios Arampatzis

Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years of experience in evaluating cybersecurity and managing IT projects. He works as an informatics instructor at AKMI Educational Institute, while his interests include exploring the human side of cybersecurity.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat