SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Presented By:
Anurag Srivastava
Sr. Software Consultant
@anurag_sri06
Hashicorp Vault:
Secure way to keep
your secrets
Our Agenda
01 Why HashiCorp Vault?
02 Features of HashiCorp
Vault
03 Working of HashiCorp Vault
04 HashiCorp Vault Architecture
05 How HashiCorp Vault different from
others?
06 Demo
Why Vault?
Vault is the secure place to store the secrets, password, token, APIKeys of the system with the
control of their access. It provides security by encrypting the keys.
Traditional way to store the secrets/Static Infrastructure
● High trust networks
● A clear network perimeter
● Security enforced by IP Address
Vault way to store the secrets/Dynamic Infrastructure
● Low-trust networks in public clouds
● Unknown network perimeter across clouds
● Security enforced by Identity
Features of Vault
● Secure Secret Storage
● Dynamic Secrets
● Data Encryption
● Leasing and Renewal
● Revocation
Working of Vault
Secret
Vault
Client
Authentication
(Identity based
Authentication)
Encryption
Auth
Auth/Script
Vault Architecture
Vault Architecture
● Storage Backend - A storage backend is responsible for durable storage of encrypted data. The
storage backend is configured when starting the Vault server.
● Barrier - The barrier is cryptographic steel and concrete around the Vault.
● Secrets Engine - A secrets engine is responsible for managing secrets.
● Audit Device - An audit device is responsible for managing audit logs.
● Auth Method - An auth method is used to authenticate users or applications which are
connecting to Vault.
● Client Token - A client token is a conceptually similar to a session cookie on a web site. Once a
user authenticates.
● Secret - A secret is the term for anything returned by Vault which contains confidential or
cryptographic material.
● Server - Vault depends on a long-running instance which operates as a server.
Vault Security
● Vault doesn’t trust the connection between client and server.
● Clients use TLS to verify the identity of the server and to establish a secure communication
channel.
● Vault uses a security barrier for all requests made to the backend. The security barrier
automatically encrypts all data leaving Vault using a 256-bit Advanced Encryption Standard (AES)
cipher in the Galois Counter Mode (GCM) with 96-bit nonces.
● Once unsealed the standard ACL mechanisms are used for all requests.
● If vault is unseal via master key then anyone can access the entire vault. Here shamir's technique
allows us to split the master key into multiple shares or parts.
● The number of shares and the threshold needed is configurable, but by default Vault generates 5
shares, any 3 of which must be provided to reconstruct the master key.
How Vault different from others?
There are many other options are in the industry like Chef, Puppet, HSMs, Dropbox, Consul,
Amazon KMS, Keywhiz, Custom Solutions. Let’s see that how vault is differ from those:
● Vault is not tied up with any configuration management system. We can read data via
configuration or API directly.
● Vault encrypt keys on the physical location. So we need to get multiple keys for reading the
secrets.
● We cannot access vault until unless we don’t unseal the vault.
● Vault audit the logs each and every interactions.
● Access tokens can be given fine-grained control over what secrets can be accessed.
● Vault can create the dynamic secrets.
● Vault provides the higher level policy management.
● Vault forces a mandatory lease contract with clients. All secrets read from Vault have an
associated lease which enables operators to audit key usage, perform key rolling, and ensure
automatic revocation.
Start server on Dev mode
● Start server on dev mode:
vault server -dev
● Dev mode start as unsealed mode.
● We can run seal and unseal commands for the seal and unseal functionality:
vault operator seal
vault operator unseal
● Vault stores data in-memory.
● Default server address is : 127.0.0.1:8200 without any TLS.
● Store root access token.
Why Seal/Unseal required?
Vault stores data in encrypted form. Vault needs the encryption key in order to decrypt the data.
The encryption key is also stored with the data, but encrypted with another encryption key known
as the master key. The master key isn't stored anywhere.
Therefore, to decrypt the data, Vault must decrypt the encryption key which requires the master
key. Unsealing is the process of reconstructing this master key.
Reference
Hashicorp Vault
Thank You !
Get in touch with us:
Lorem Studio, Lord Building
D4456, LA, USA

Weitere ähnliche Inhalte

Mehr von Knoldus Inc.

Mehr von Knoldus Inc. (20)

NuGet Packages Presentation (DoT NeT).pptx
NuGet Packages Presentation (DoT NeT).pptxNuGet Packages Presentation (DoT NeT).pptx
NuGet Packages Presentation (DoT NeT).pptx
 
Data Quality in Test Automation Navigating the Path to Reliable Testing
Data Quality in Test Automation Navigating the Path to Reliable TestingData Quality in Test Automation Navigating the Path to Reliable Testing
Data Quality in Test Automation Navigating the Path to Reliable Testing
 
K8sGPTThe AI​ way to diagnose Kubernetes
K8sGPTThe AI​ way to diagnose KubernetesK8sGPTThe AI​ way to diagnose Kubernetes
K8sGPTThe AI​ way to diagnose Kubernetes
 
Introduction to Circle Ci Presentation.pptx
Introduction to Circle Ci Presentation.pptxIntroduction to Circle Ci Presentation.pptx
Introduction to Circle Ci Presentation.pptx
 
Robusta -Tool Presentation (DevOps).pptx
Robusta -Tool Presentation (DevOps).pptxRobusta -Tool Presentation (DevOps).pptx
Robusta -Tool Presentation (DevOps).pptx
 
Optimizing Kubernetes using GOLDILOCKS.pptx
Optimizing Kubernetes using GOLDILOCKS.pptxOptimizing Kubernetes using GOLDILOCKS.pptx
Optimizing Kubernetes using GOLDILOCKS.pptx
 
Azure Function App Exception Handling.pptx
Azure Function App Exception Handling.pptxAzure Function App Exception Handling.pptx
Azure Function App Exception Handling.pptx
 
CQRS Design Pattern Presentation (Java).pptx
CQRS Design Pattern Presentation (Java).pptxCQRS Design Pattern Presentation (Java).pptx
CQRS Design Pattern Presentation (Java).pptx
 
ETL Observability: Azure to Snowflake Presentation
ETL Observability: Azure to Snowflake PresentationETL Observability: Azure to Snowflake Presentation
ETL Observability: Azure to Snowflake Presentation
 
Scripting with K6 - Beyond the Basics Presentation
Scripting with K6 - Beyond the Basics PresentationScripting with K6 - Beyond the Basics Presentation
Scripting with K6 - Beyond the Basics Presentation
 
Getting started with dotnet core Web APIs
Getting started with dotnet core Web APIsGetting started with dotnet core Web APIs
Getting started with dotnet core Web APIs
 
Introduction To Rust part II Presentation
Introduction To Rust part II PresentationIntroduction To Rust part II Presentation
Introduction To Rust part II Presentation
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Configuring Workflows & Validators in JIRA
Configuring Workflows & Validators in JIRAConfiguring Workflows & Validators in JIRA
Configuring Workflows & Validators in JIRA
 
Advanced Python (with dependency injection and hydra configuration packages)
Advanced Python (with dependency injection and hydra configuration packages)Advanced Python (with dependency injection and hydra configuration packages)
Advanced Python (with dependency injection and hydra configuration packages)
 
Azure Databricks (For Data Analytics).pptx
Azure Databricks (For Data Analytics).pptxAzure Databricks (For Data Analytics).pptx
Azure Databricks (For Data Analytics).pptx
 
The Power of Dependency Injection with Dagger 2 and Kotlin
The Power of Dependency Injection with Dagger 2 and KotlinThe Power of Dependency Injection with Dagger 2 and Kotlin
The Power of Dependency Injection with Dagger 2 and Kotlin
 
Data Engineering with Databricks Presentation
Data Engineering with Databricks PresentationData Engineering with Databricks Presentation
Data Engineering with Databricks Presentation
 
Databricks for MLOps Presentation (AI/ML)
Databricks for MLOps Presentation (AI/ML)Databricks for MLOps Presentation (AI/ML)
Databricks for MLOps Presentation (AI/ML)
 
NoOps - (Automate Ops) Presentation.pptx
NoOps - (Automate Ops) Presentation.pptxNoOps - (Automate Ops) Presentation.pptx
NoOps - (Automate Ops) Presentation.pptx
 

Kürzlich hochgeladen

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Kürzlich hochgeladen (20)

%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 

Harshicorp Vault: Secure Way To Keep Your Secrets

  • 1. Presented By: Anurag Srivastava Sr. Software Consultant @anurag_sri06 Hashicorp Vault: Secure way to keep your secrets
  • 2. Our Agenda 01 Why HashiCorp Vault? 02 Features of HashiCorp Vault 03 Working of HashiCorp Vault 04 HashiCorp Vault Architecture 05 How HashiCorp Vault different from others? 06 Demo
  • 3. Why Vault? Vault is the secure place to store the secrets, password, token, APIKeys of the system with the control of their access. It provides security by encrypting the keys. Traditional way to store the secrets/Static Infrastructure ● High trust networks ● A clear network perimeter ● Security enforced by IP Address Vault way to store the secrets/Dynamic Infrastructure ● Low-trust networks in public clouds ● Unknown network perimeter across clouds ● Security enforced by Identity
  • 4. Features of Vault ● Secure Secret Storage ● Dynamic Secrets ● Data Encryption ● Leasing and Renewal ● Revocation
  • 5. Working of Vault Secret Vault Client Authentication (Identity based Authentication) Encryption Auth Auth/Script
  • 7. Vault Architecture ● Storage Backend - A storage backend is responsible for durable storage of encrypted data. The storage backend is configured when starting the Vault server. ● Barrier - The barrier is cryptographic steel and concrete around the Vault. ● Secrets Engine - A secrets engine is responsible for managing secrets. ● Audit Device - An audit device is responsible for managing audit logs. ● Auth Method - An auth method is used to authenticate users or applications which are connecting to Vault. ● Client Token - A client token is a conceptually similar to a session cookie on a web site. Once a user authenticates. ● Secret - A secret is the term for anything returned by Vault which contains confidential or cryptographic material. ● Server - Vault depends on a long-running instance which operates as a server.
  • 8. Vault Security ● Vault doesn’t trust the connection between client and server. ● Clients use TLS to verify the identity of the server and to establish a secure communication channel. ● Vault uses a security barrier for all requests made to the backend. The security barrier automatically encrypts all data leaving Vault using a 256-bit Advanced Encryption Standard (AES) cipher in the Galois Counter Mode (GCM) with 96-bit nonces. ● Once unsealed the standard ACL mechanisms are used for all requests. ● If vault is unseal via master key then anyone can access the entire vault. Here shamir's technique allows us to split the master key into multiple shares or parts. ● The number of shares and the threshold needed is configurable, but by default Vault generates 5 shares, any 3 of which must be provided to reconstruct the master key.
  • 9. How Vault different from others? There are many other options are in the industry like Chef, Puppet, HSMs, Dropbox, Consul, Amazon KMS, Keywhiz, Custom Solutions. Let’s see that how vault is differ from those: ● Vault is not tied up with any configuration management system. We can read data via configuration or API directly. ● Vault encrypt keys on the physical location. So we need to get multiple keys for reading the secrets. ● We cannot access vault until unless we don’t unseal the vault. ● Vault audit the logs each and every interactions. ● Access tokens can be given fine-grained control over what secrets can be accessed. ● Vault can create the dynamic secrets. ● Vault provides the higher level policy management. ● Vault forces a mandatory lease contract with clients. All secrets read from Vault have an associated lease which enables operators to audit key usage, perform key rolling, and ensure automatic revocation.
  • 10. Start server on Dev mode ● Start server on dev mode: vault server -dev ● Dev mode start as unsealed mode. ● We can run seal and unseal commands for the seal and unseal functionality: vault operator seal vault operator unseal ● Vault stores data in-memory. ● Default server address is : 127.0.0.1:8200 without any TLS. ● Store root access token.
  • 11. Why Seal/Unseal required? Vault stores data in encrypted form. Vault needs the encryption key in order to decrypt the data. The encryption key is also stored with the data, but encrypted with another encryption key known as the master key. The master key isn't stored anywhere. Therefore, to decrypt the data, Vault must decrypt the encryption key which requires the master key. Unsealing is the process of reconstructing this master key.
  • 13. Thank You ! Get in touch with us: Lorem Studio, Lord Building D4456, LA, USA