Session

Common pitfalls in Jenkins security - and How to avoid them

It is 2025, and Jenkins, an open source automation server with 20 years of history, still dominates the CI/CD market and remains a mission-critical part of the worldwide software supply chain. In 2025, it even won the "The most innovative DevOps open source project" award from DevOps Dozen, and got security grants from Alpha Omega. But Jenkins still has quite an old architecture, and one can consider it a remote execution engine which has access to project data… by design. So, how secure is your instance and supply chain when using Jenkins?

When it comes to Jenkins instances with thousands of users, it is hard to retain status quo between security itself and its impact on user experience due to the restrictions and performance degradation. I will talk about Jenkins security model, best practices and common non-newbie configuration mistakes which we often see on production instances. In particular we will discuss Groovy scripting, controller-to-agent communications and resource isolation. We will also review a few supply chain attack cases that happened through Jenkins, and how one could prevent them.

Target audience for this talk: experienced Jenkins administrators and users interested in Security. The learnings are applicable to other CI/CD tools, especially the self-hosted ones

Old edition from 2018: https://speakerdeck.com/onenashev/common-pitfalls-in-jenkins-security

Oleg Nenashev

Community Builder and DevRel Consultant, CNCF Ambassador, Jenkins core maintainer

Neuchâtel, Switzerland

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top