SlideShare a Scribd company logo
Copyright © 2018 HashiCorp
Adopting HashiCorp
Vault
Deployment, adoption and beyond.
Version: 1119.18
Nicolas Corrarello
Regional Director, Solutions Engineering
Whoami
Copyright © 2018 HashiCorp ⁄⁄
Vault open source contributor
2+ years in HashiCorp
Can’t honestly remember when I started
using HashiCorp tools
!2
Helped operationalise a
number of large deployments
ncorrare
nicolas@hashicorp.com
Large scale Vault deployments
Centralised capability, consumed by many groups
What are we
talking about?
Copyright © 2018 HashiCorp ⁄⁄
1
2
!3
No wire-boarding required
Local and multi-geo scaling solutions
3 Fully supported and up to best practice
4 No friction
5 Vault as a capability, not a tool
Masking a problem vs addressing it
6 Pragmatic vs. Dogmatic
Sanely running open source vs letting HashiCorp solve the problem for you
7 Properly document and HashiCorp sanctioned
Yay! Documentation!
Copyright © 2018 HashiCorp ⁄
Day 0:
Vault what??
!4
secret
/ˈsiːkrɪt/
Copyright © 2018 HashiCorp ⁄ !5
adjective

not known or seen or not meant to be known or seen by others."how did you
guess I'd got a secret plan?"
synonyms:
1.confidential, strictly confidential, top
secret, classified, restricted, unrevealed, undisclosed, unpublished, untold, unk
nown, uncommunicated, behind someone's back, under wraps, unofficial, off
the record, not for publication/circulation, not to be made public, not to be
disclosed; More
noun

something that is kept or meant to be kept unknown or unseen by others."a state
secret"
synonyms:
1.confidential matter, confidence, private affair, skeleton in the cupboard, ”he just
can't keep a secret”
origin
late Middle English: from Old French, from Latin secretus (adjective) ‘separate,
set apart’, from the verb secernere, from se- ‘apart’ + cernere ‘sift’.







/ DAY ZERO
Keeping secrets
Copyright © 2018 HashiCorp ⁄ !6
API
Audit
Static
Secrets
Dynamic
Secrets
EaaS
LDAP / AD
GitHub
Okta
MFA / Radius
AWS / Azure / GCP
Kubernetes
TLS
JWT
AppRole
Identity
“What kind of secret can I access?”
“To do what?”
Policy & Governance “Under what conditions?”
MySQL / PostgreSQL
Oracle / MSSQL / SAP Hana
Cassandra / MongoDB
Cloud (AWS / GCP / Azure)
SSH / AD
PKI
Encrypt / Decrypt
Sign / Verify
HMAC / Hash
Entropy
/ DAY ZERO
Vault
Cryptographic
Model
So what encrypts what
now?
Copyright © 2018 HashiCorp ⁄ !7/ DAY ZERO
Transport - TLS 1.2 or higher
Storage - AES 256
B
A
R
R
I
E
R
Storage Key
Master Key
Seal
Single Site HA
Deployment
Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE !8
Multi-Site HA
Deployment
Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE !9
Copyright © 2018 HashiCorp ⁄
Day One:
Let’s get it running
!10
Immutable is preferred
More secure, less prone to having someone SSH into the system and poke memory
Installing Vault
Copyright © 2018 HashiCorp ⁄⁄
1
2
!11
Configuration management helps
Roles / modules / cookbooks available in your nearest registry
3 SELinux is not just for disabling
4 Vault is released quarterly, with minor releases monthly
5 Consul can help with Load Balancing
Patterns available in our deployment guide
6 Telemetry & Audit
Bring your ELK
7 Backup / Restore
Individual node failure
In case of an individual node failure, or up to two node failures, the solution will continue to
run without operator intervention.Recovery
Scenarios
Copyright © 2018 HashiCorp ⁄⁄
1
2
!12
Cluster Failure
If the Vault cluster fails, it can be reprovisioned using the same Storage Backend
configuration.
3 Consul node failure
In case of an individual node failure, or up to two node failures, the solution will continue to
run without operator intervention.
4 Consul quorum loss
If the Consul cluster were to lose quorum, there are alternatives to regain service availability,
although the recommended approach from an RTO/RPO perspective is to fail over to a DR
Cluster or promote a Performance Replica.
5 Seal key failure
If the Seal Key was to be deleted or unavailable, the only supported scenario is failing over
to a DR Cluster or Performance Replica.
6
Initialization
Ceremony
Copyright © 2018 HashiCorp ⁄⁄ !13
Operator
The team or individuals charged with keeping
Vault running. Traditionally the team that
either works with Cloud account provisioning,
SREs or Infrastructure team.
Organisational
roles
Who does who?
Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE
1 Consumer
Anyone that needs a secret!
2
Infosec / Crypto
Key handling, rotation. Review architecture
and policies.
3 Audit
Review logs and metrics
4
!14
Copyright © 2018 HashiCorp ⁄
Day Two:
Operationalise and
consume
!15
Namespaces
Copyright © 2018 HashiCorp ⁄⁄ !16
Not always the preferred choice
Organisational maturity has weigh ins
1
2 Most friction-less approach
From Vault silos to centralised capability
Secure
introduction
What do you trust?
Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE !17
AUTHENTICATE IDENTITY
Against Trusted Identity Providers
Authentication
Identity-Based Access/Backends
Client
Secrets
Secrets Management/Backends
API
Direct call to Vault
Consuming
secrets
Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE
1 Templating
Rendering secrets on configuration files
2
Environment Variables3 3rd Party Pass Through
Use response wrapping!
4
!18
Transit Key
Officers
Copyright © 2018 HashiCorp ⁄⁄ !19
## Crypto officers
# Create key material, non deletable, non exportable in unencrypted
fashion, only aes-256 or rsa-4096
path "/transit/keys" {
capabilities = ["create", "update"]
allowed_parameters = {
"allow_plaintext_backup" = ["false"]
"type" = ["aes256-gcm96", "rsa-4096"]
"convergent_encryption" = []
"derived" = []
}
}
# List keys
path "/transit/keys" {
capabilities = ["list"]
}
# Rotate Key
path “/transit/keys/foo/rotate" {
capabilities = ["create"]
}
Transit
Consumers
Copyright © 2018 HashiCorp ⁄⁄ !20
## Consumers
# Encrypt information
path "/transit/encrypt/keyname" {
capabilities = ["create"]
}
# Decrypt information
path "/transit/decrypt/keyname" {
capabilities = ["create"]
}
# Rewrap information
path "/transit/rewrap/keyname" {
capabilities = ["create"]
}
Copyright © 2018 HashiCorp ⁄
Day N:
Keep it running
!21
Storage Key
rotation
Copyright © 2018 HashiCorp ⁄⁄ !22
$ vault operator rotate
Key Term 3
Install Time 01 May 17 10:30 UTC
Master Key
rotation
Copyright © 2018 HashiCorp ⁄⁄ !23
DR Promotion
Copyright © 2018 HashiCorp ⁄⁄ !24
Copyright © 2018 HashiCorp ⁄
Vault Adoption
!25
The Whitepaper
Copyright © 2018 HashiCorp ⁄⁄ !26
Two years of best practice in
Vault deployment
Reviewed by Engineering, Solutions
Engineering, and Enterprise Architecture
Available today on the
HashiCorp website
www.hashicorp.com
hello@hashicorp.com
Thank you

More Related Content

PPTX
Hashicorp Vault ppt
PDF
Secret Management with Hashicorp’s Vault
PPTX
Keeping a Secret with HashiCorp Vault
PDF
Vault 101
PDF
Introducing Vault
PDF
Introduction to Vault
PPTX
Vault - Secret and Key Management
PPTX
Kubernetes Security
Hashicorp Vault ppt
Secret Management with Hashicorp’s Vault
Keeping a Secret with HashiCorp Vault
Vault 101
Introducing Vault
Introduction to Vault
Vault - Secret and Key Management
Kubernetes Security

What's hot (20)

PDF
Overview of secret management solutions and architecture
PDF
Hashicorp Vault: Open Source Secrets Management at #OPEN18
PDF
Vault
PDF
Credential store using HashiCorp Vault
PDF
Introduction to Docker Compose
PDF
KubeVirt (Kubernetes and Cloud Native Toronto)
PPTX
Hashicorp Vault Open Source vs Enterprise
PDF
Using Vault to decouple MySQL Secrets
PDF
HashiCorp's Vault - The Examples
PDF
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
PDF
Kubernetes security
PPTX
Apache Kafka Best Practices
PDF
Hands-On Introduction to Kubernetes at LISA17
PDF
HashiCorp Vault configuration as code via HashiCorp Terraform- stories from t...
PDF
Event-driven autoscaling through KEDA and Knative Integration | DevNation Tec...
PDF
Kubernetes
PDF
Guide of authentication and authorization for cloud native applications with ...
PDF
Introduction to Docker storage, volume and image
PDF
[KubeCon EU 2022] Running containerd and k3s on macOS
Overview of secret management solutions and architecture
Hashicorp Vault: Open Source Secrets Management at #OPEN18
Vault
Credential store using HashiCorp Vault
Introduction to Docker Compose
KubeVirt (Kubernetes and Cloud Native Toronto)
Hashicorp Vault Open Source vs Enterprise
Using Vault to decouple MySQL Secrets
HashiCorp's Vault - The Examples
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Kubernetes security
Apache Kafka Best Practices
Hands-On Introduction to Kubernetes at LISA17
HashiCorp Vault configuration as code via HashiCorp Terraform- stories from t...
Event-driven autoscaling through KEDA and Knative Integration | DevNation Tec...
Kubernetes
Guide of authentication and authorization for cloud native applications with ...
Introduction to Docker storage, volume and image
[KubeCon EU 2022] Running containerd and k3s on macOS
Ad

Similar to Adopting HashiCorp Vault (20)

PPTX
Vault Open Source vs Enterprise v2
PDF
Introduction to vault
PPTX
Hashicorp Vault Connector - Dallas MuleSoft Meetup - May 6, 2020
PDF
Vault 1.4 launch webinar
PPTX
Designing High Availability for HashiCorp Vault in AWS
PPTX
Vault Digital Transformation
PDF
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
PPTX
Cloud Adoption: From Start to PaaS
PPTX
Secret Management with Hashicorp Vault and Consul on Kubernetes
PDF
Secrets management vault cncf meetup
PPTX
Vault w/ config injection kubernetes canada
PDF
Best practices for Terraform with Vault
PDF
Hashicorp Tooling: Value, efficiency & security
PDF
Kubernautes meetup II
PDF
DevOpsDays - DevOps: Security 干我何事?
PPTX
Securing Your CI Pipeline with HashiCorp Vault - P2
PPTX
Hashicorp Corporate Pitch Deck Stenio_v2
PPTX
Vault Agent and Vault 0.11 features
PDF
Vault 1.0: How to Auto-Unseal and Other New Features
PDF
Issuing temporary credentials for my sql using hashicorp vault
Vault Open Source vs Enterprise v2
Introduction to vault
Hashicorp Vault Connector - Dallas MuleSoft Meetup - May 6, 2020
Vault 1.4 launch webinar
Designing High Availability for HashiCorp Vault in AWS
Vault Digital Transformation
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Cloud Adoption: From Start to PaaS
Secret Management with Hashicorp Vault and Consul on Kubernetes
Secrets management vault cncf meetup
Vault w/ config injection kubernetes canada
Best practices for Terraform with Vault
Hashicorp Tooling: Value, efficiency & security
Kubernautes meetup II
DevOpsDays - DevOps: Security 干我何事?
Securing Your CI Pipeline with HashiCorp Vault - P2
Hashicorp Corporate Pitch Deck Stenio_v2
Vault Agent and Vault 0.11 features
Vault 1.0: How to Auto-Unseal and Other New Features
Issuing temporary credentials for my sql using hashicorp vault
Ad

Recently uploaded (20)

PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Complete Guide to Website Development in Malaysia for SMEs
PPTX
Tech Workshop Escape Room Tech Workshop
PPTX
Custom Software Development Services.pptx.pptx
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
MCP Security Tutorial - Beginner to Advanced
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Salesforce Agentforce AI Implementation.pdf
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
Why Generative AI is the Future of Content, Code & Creativity?
Complete Guide to Website Development in Malaysia for SMEs
Tech Workshop Escape Room Tech Workshop
Custom Software Development Services.pptx.pptx
How to Use SharePoint as an ISO-Compliant Document Management System
Designing Intelligence for the Shop Floor.pdf
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Advanced SystemCare Ultimate Crack + Portable (2025)
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Computer Software and OS of computer science of grade 11.pptx
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Wondershare Recoverit Full Crack New Version (Latest 2025)
Topaz Photo AI Crack New Download (Latest 2025)
Monitoring Stack: Grafana, Loki & Promtail
How Tridens DevSecOps Ensures Compliance, Security, and Agility
MCP Security Tutorial - Beginner to Advanced
Patient Appointment Booking in Odoo with online payment
Salesforce Agentforce AI Implementation.pdf

Adopting HashiCorp Vault

  • 1. Copyright © 2018 HashiCorp Adopting HashiCorp Vault Deployment, adoption and beyond. Version: 1119.18
  • 2. Nicolas Corrarello Regional Director, Solutions Engineering Whoami Copyright © 2018 HashiCorp ⁄⁄ Vault open source contributor 2+ years in HashiCorp Can’t honestly remember when I started using HashiCorp tools !2 Helped operationalise a number of large deployments ncorrare nicolas@hashicorp.com
  • 3. Large scale Vault deployments Centralised capability, consumed by many groups What are we talking about? Copyright © 2018 HashiCorp ⁄⁄ 1 2 !3 No wire-boarding required Local and multi-geo scaling solutions 3 Fully supported and up to best practice 4 No friction 5 Vault as a capability, not a tool Masking a problem vs addressing it 6 Pragmatic vs. Dogmatic Sanely running open source vs letting HashiCorp solve the problem for you 7 Properly document and HashiCorp sanctioned Yay! Documentation!
  • 4. Copyright © 2018 HashiCorp ⁄ Day 0: Vault what?? !4
  • 5. secret /ˈsiːkrɪt/ Copyright © 2018 HashiCorp ⁄ !5 adjective
 not known or seen or not meant to be known or seen by others."how did you guess I'd got a secret plan?" synonyms: 1.confidential, strictly confidential, top secret, classified, restricted, unrevealed, undisclosed, unpublished, untold, unk nown, uncommunicated, behind someone's back, under wraps, unofficial, off the record, not for publication/circulation, not to be made public, not to be disclosed; More noun
 something that is kept or meant to be kept unknown or unseen by others."a state secret" synonyms: 1.confidential matter, confidence, private affair, skeleton in the cupboard, ”he just can't keep a secret” origin late Middle English: from Old French, from Latin secretus (adjective) ‘separate, set apart’, from the verb secernere, from se- ‘apart’ + cernere ‘sift’.
 
 
 
 / DAY ZERO
  • 6. Keeping secrets Copyright © 2018 HashiCorp ⁄ !6 API Audit Static Secrets Dynamic Secrets EaaS LDAP / AD GitHub Okta MFA / Radius AWS / Azure / GCP Kubernetes TLS JWT AppRole Identity “What kind of secret can I access?” “To do what?” Policy & Governance “Under what conditions?” MySQL / PostgreSQL Oracle / MSSQL / SAP Hana Cassandra / MongoDB Cloud (AWS / GCP / Azure) SSH / AD PKI Encrypt / Decrypt Sign / Verify HMAC / Hash Entropy / DAY ZERO
  • 7. Vault Cryptographic Model So what encrypts what now? Copyright © 2018 HashiCorp ⁄ !7/ DAY ZERO Transport - TLS 1.2 or higher Storage - AES 256 B A R R I E R Storage Key Master Key Seal
  • 8. Single Site HA Deployment Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE !8
  • 9. Multi-Site HA Deployment Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE !9
  • 10. Copyright © 2018 HashiCorp ⁄ Day One: Let’s get it running !10
  • 11. Immutable is preferred More secure, less prone to having someone SSH into the system and poke memory Installing Vault Copyright © 2018 HashiCorp ⁄⁄ 1 2 !11 Configuration management helps Roles / modules / cookbooks available in your nearest registry 3 SELinux is not just for disabling 4 Vault is released quarterly, with minor releases monthly 5 Consul can help with Load Balancing Patterns available in our deployment guide 6 Telemetry & Audit Bring your ELK 7 Backup / Restore
  • 12. Individual node failure In case of an individual node failure, or up to two node failures, the solution will continue to run without operator intervention.Recovery Scenarios Copyright © 2018 HashiCorp ⁄⁄ 1 2 !12 Cluster Failure If the Vault cluster fails, it can be reprovisioned using the same Storage Backend configuration. 3 Consul node failure In case of an individual node failure, or up to two node failures, the solution will continue to run without operator intervention. 4 Consul quorum loss If the Consul cluster were to lose quorum, there are alternatives to regain service availability, although the recommended approach from an RTO/RPO perspective is to fail over to a DR Cluster or promote a Performance Replica. 5 Seal key failure If the Seal Key was to be deleted or unavailable, the only supported scenario is failing over to a DR Cluster or Performance Replica. 6
  • 14. Operator The team or individuals charged with keeping Vault running. Traditionally the team that either works with Cloud account provisioning, SREs or Infrastructure team. Organisational roles Who does who? Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE 1 Consumer Anyone that needs a secret! 2 Infosec / Crypto Key handling, rotation. Review architecture and policies. 3 Audit Review logs and metrics 4 !14
  • 15. Copyright © 2018 HashiCorp ⁄ Day Two: Operationalise and consume !15
  • 16. Namespaces Copyright © 2018 HashiCorp ⁄⁄ !16 Not always the preferred choice Organisational maturity has weigh ins 1 2 Most friction-less approach From Vault silos to centralised capability
  • 17. Secure introduction What do you trust? Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE !17 AUTHENTICATE IDENTITY Against Trusted Identity Providers Authentication Identity-Based Access/Backends Client Secrets Secrets Management/Backends
  • 18. API Direct call to Vault Consuming secrets Copyright © 2018 HashiCorp ⁄⁄ USE CASE: INFRASTRUCTURE AS CODE 1 Templating Rendering secrets on configuration files 2 Environment Variables3 3rd Party Pass Through Use response wrapping! 4 !18
  • 19. Transit Key Officers Copyright © 2018 HashiCorp ⁄⁄ !19 ## Crypto officers # Create key material, non deletable, non exportable in unencrypted fashion, only aes-256 or rsa-4096 path "/transit/keys" { capabilities = ["create", "update"] allowed_parameters = { "allow_plaintext_backup" = ["false"] "type" = ["aes256-gcm96", "rsa-4096"] "convergent_encryption" = [] "derived" = [] } } # List keys path "/transit/keys" { capabilities = ["list"] } # Rotate Key path “/transit/keys/foo/rotate" { capabilities = ["create"] }
  • 20. Transit Consumers Copyright © 2018 HashiCorp ⁄⁄ !20 ## Consumers # Encrypt information path "/transit/encrypt/keyname" { capabilities = ["create"] } # Decrypt information path "/transit/decrypt/keyname" { capabilities = ["create"] } # Rewrap information path "/transit/rewrap/keyname" { capabilities = ["create"] }
  • 21. Copyright © 2018 HashiCorp ⁄ Day N: Keep it running !21
  • 22. Storage Key rotation Copyright © 2018 HashiCorp ⁄⁄ !22 $ vault operator rotate Key Term 3 Install Time 01 May 17 10:30 UTC
  • 23. Master Key rotation Copyright © 2018 HashiCorp ⁄⁄ !23
  • 24. DR Promotion Copyright © 2018 HashiCorp ⁄⁄ !24
  • 25. Copyright © 2018 HashiCorp ⁄ Vault Adoption !25
  • 26. The Whitepaper Copyright © 2018 HashiCorp ⁄⁄ !26 Two years of best practice in Vault deployment Reviewed by Engineering, Solutions Engineering, and Enterprise Architecture Available today on the HashiCorp website