Introduction to Vault
What is Vault
- Manage secrets and Protect Sensitive Data
- Provides a single source of Secrets
- Provides Lifecycle Management for Secrets
- Eliminates secret sprawl
- Securely store any secret
- Provide governance for access to secrets
- What is a secret?
- Anything an organization deems sensitive
How Vault Works
Vault Interfaces
- CLI
- UI
- API
Vault Authentication
An application that needs to interact with Vault uses either:
- User/Pass
- RoleID/Secret/ID
- TLS Cert
- Integrated Cloud Creds Once authenticated, Vault will generate a token The token has an expiry (TTL)
Token provides access to specific entities and the permissions to those entities (i.e. Vault Paths, R/W perms)
Benefits and Use Cases for Vault
- Store long-lived, static secrets
- Dynamically Generate Secrets
- API
- IAM across different clouds and systems
- Provide Encryption as a Service
- Act as a Root or Intermediate Certificate Authority
Use Cases
- Centralize the Storage of Secrets
- Migrate to Dynamically Generated Secrets
- Secure Data with a Centralized Workflow for Encryption Operations
- Automate the generation of X509 Certificates
- Migrate to IAM based access
Storage of Secrets
Centralize the storage of secrets across the organization into a consolidated platform
Migrate to Dynamic Credentials
Static Credentials:
- Validation 24/7/365
- Long-lived
- Manual Password Rotation
- Frequently Shared
- Reused across systems
- Susceptible to Being added to Code
- Often Highly Privileged
- Manually Created Dynamic Credentials:
- Short-Lived
- Follows Principal of Least Privilege
- Automatically Revocated (Based on Lease)
- Each System Can Retrieve Unique Credentials
- Programmatically Retrieved
- No Human Interaction
Encrypt Data
Secure Data with a Centralized Workflow for Encryption Options
- Transit
- KMIP
- Kye Mgmt
- Transform