SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Copyright © 2019 HashiCorp
Securing The Edge:
Military Computing Systems
Timothy J. Olson - SE, Public Sector
Secrets Management for Tactical Systems
Providing secure edge computing to
warfighters
Provide secrets management to tactical units for
battlefield management and secure communication
workflows
▪ Operable in Isolation
Operational in the face of long-term losses of
connectivity with infrastructure
▪ Resilient
Secure against possible physical compromise
▪ Easy to Use
Requires little/no development support from warfighter
users
Solution: Vault + Consul
Leverage Vault and Consul to provide highly
available, resilient, and secure access to
tactical computing systems at the edge
▪ Centrally manage and distribute K/V secrets
to warfighters using Vault Agent Caching
and Templating
▪ Replicate secrets and perform distributed
consensus via Vault Replication
▪ Leverage Consul to perform service
discovery and networking of Vault across
tactical IP networks
Evolving application workload delivery
Challenge
How to deliver Enterprise to
Edge applications securely and
consistently?
Solution
Embracing a new operating
model for dynamic cloud
architectures: a cloud operating
model.
PHYSICAL VMs CONTAINERS SERVICES
APP SERVER CLOUD NATIVE SERVERLESS EDGE
DEVICES
Run
Development
Connect
Networking
Secure
Security
Provision
Operations
Dedicated
Infrastructure
Scheduled across the fleet
Host-based
Static IP
Service-based
Dynamic IP
High trust
IP-based
Low trust
Identity-based
Dedicated servers
Homogeneous
Capacity on-demand
Heterogeneous
STATIC/FIXED DYNAMIC
Evolving application workload delivery
vSphere
Hardware
IP:
Hardware
vCenter
vSphere
Various
Hardware
Identity:
AD/LDAP
Terraform
EKS / ECS
Lambda
CloudApp/
AppMesh
Identity:
AWS IAM
Cloud
Formation
AKS / ACS
Azure
Functions
Proprietary
Identity:
Azure AD
Resource
Manager
GKE Cloud
Functions
Proprietary
Identity:
GCP IAM
Cloud Dep.
Manager
Challenge
How to deliver Enterprise to
Edge applications securely and
consistently?
PHYSICAL VMs CONTAINERS SERVICES
APP SERVER CLOUD NATIVE SERVERLESS EDGE
DEVICES
Solution
Proprietary solutions reduce
flexibility and creates
complexity across vendors
Run
Development
Connect
Networking
Secure
Security
Provision
Operations
DEDICATED HYBRID/MULTI CLOUD
EDGEENTERPRISE
Evolving application workload delivery
Networking
Security
Infrastructure
Orchestration
Challenge
How to deliver Enterprise to
Edge applications securely and
consistently?
Solution
Establish central shared
service platforms with a
single control plane, and
consistent workflows.
PHYSICAL VMs CONTAINERS SERVICES
APP SERVER CLOUD NATIVE SERVERLESS EDGE
DEVICES
EDGEENTERPRISE
A Common Operating Model with
the HashiCorp Suite
Provision
Operations
Secure
Security
Connect
Networking
Run
Development
Private Cloud AWS Azure GCP
Cloud
Operating
Model
Shared Services
Multi Cloud
Infrastructure
Automation
—
Infrastructure as code
Compliance & management
Self service infrastructure
Provision / Operations
Multi Cloud
Security
Automation
—
Identity-based security
Secrets management
Encryption as a service
Advanced data protection
Secure / Security
Multi Cloud
Networking
Automation
—
Common service registry
Service registry and discovery
Network middleware
automation
Service mesh
Connect / Networking
Multi Cloud
Application
Automation
—
Workload orchestration
Container orchestration
Heterogeneous orchestration
Run / Development
Vault: Security Automation
Provides the foundation for cloud security that uses trusted sources of identity
to keep secrets and application data secure in the cloud operating model
Secrets management to centrally store and
protect secrets across clouds and applications
Data encryption to keep application data secure
across environments and workloads
Advanced Data Protection to secure workloads
and data across traditional systems, clouds, and
infrastructure.
Vault: Hybrid / Multi-Cloud Security
Secure
Multi Cloud Security
● Hybrid / Multi Cloud
Secrets Management
○ Enables teams to securely
store and tightly control
access to tokens,
passwords, certificates, and
encryption keys for
protecting machines and
application
● EaaS: Encryption as a
Service
Single Control
Plane for cloud
security
● Automate, control, and secure infrastructure and
applications through one API
● Unified support across heterogeneous
environments
● Integrate with providers and technologies you’re
already using
© 2018 HashiCorp
Vault Agent
VAULT APPROACH TO DYNAMIC INFRASTRUCTURE 12
Vault Agent is a client daemon that provides
the following features:
● Auto-Auth - Automatically authenticate to
Vault and manage the token renewal
process for locally-retrieved dynamic
secrets.
● Caching - Allows client-side caching of
responses containing newly created tokens
and responses containing leased secrets
generated off of these newly created tokens.
● Templating - Allows rendering of user
supplied templates by Vault Agent, using the
token generated by the Auto-Auth step.
© 2018 HashiCorp
Vault Agent
Caching
VAULT APPROACH TO DYNAMIC INFRASTRUCTURE 13
Vault Agent Caching can cache the tokens
and leased secrets proxied through the
agent which includes the auto-auth token.
This allows for easier access to Vault
secrets for edge applications, reduces
the I/O burden for basic secrets access for
Vault clusters, and allows for secure local
access to leased secrets for the life of a
valid token
© 2018 HashiCorp
Vault Agent
Templates
VAULT APPROACH TO DYNAMIC INFRASTRUCTURE 14
Vault Agent Templates allows Vault
secrets to be rendered to files using the
Consul Template markup language. This
significantly simplifies the workflow
when you are integrating your
applications with Vault.
Consul
Provides a foundation of cloud network automation using a shared registry for
service based networking
50k+
Used at scale with
50k+ agents
1M+
Monthly D/Ls
Service registry & health monitoring to provide a
real-time directory of all services with their health status
Network middleware automation with service discovery
for dynamic reconfiguration as services scale up, down or
move
Zero trust network with service mesh to secure
service-to-service traffic with identity-based security policies
and encrypted traffic with Mutual-TLS
The Shift from Static to Dynamic Networking
● Modular services with dynamic IPs, running on bare metals, VMs, containers...
● 85% of volume from complex east-west traffic*
● No clear network perimeters
Consul: Hybrid / Multi-Cloud Service Networking (MESH)
Connect
Hybrid/Multi Cloud
Service Networking
● Consul provides a hybrid/multi-cloud
service networking layer to connect
and secure services
● Service Registry & Discovery
○ Common service registry
○ Integrated health checks
○ DNS and API interfaces to enable
any service to discover and be
discovered by other services.
● Consistent registry and discovery of
services across multi-data center,
cloud, and platform environments.
● Service Mesh
○ Consul provides a distributed service
mesh to connect, secure, and
configure services across any
runtime platform and cloud.
Consul Connect
Consul Connect provides service-to-service
connection authorization and encryption using
mutual Transport Layer Security (TLS).
Applications can use sidecar proxies in a service
mesh configuration to establish TLS connections
for inbound and outbound connections without
being aware of Connect at all. Applications may
also natively integrate with Connect for optimal
performance and security. Connect can help you
secure your services and provide data about
service-to-service communications.
Secure service-to-service traffic with identity-based
security policies and encrypted traffic with Mutual-TLS
Single Control Plane
for cloud networking
● Automate and control the data plane
with central service registry
● Unified support across
heterogeneous environment
● Simplified operation with single
workflow
Unified Networking Solution for Hybrid/Multi-Cloud
Vault Replication for Military Systems
Leverage Vault Replication to allow
edge-based warfighting systems to perform
secrets management with centralized Vault
environments.
▪ Primary: Source of truth located in central ship
or land-based command operations center.
▪ Secondaries: Located at mobile C2I centers
that can connect directly to edge systems.
▪ Vault Agent: Deployed on edge warfighting
systems for local secrets management
operations using K/V.
Primary Vault Cluster
Land or naval
command operations
centers
Vault Performance
Secondary
Mobile C2I such as
E3 or M1113
Vault Agent
Edge system that
uses Vault K/V
Mesh Networking with Consul Connect
Using Consul Connect will allow Vault
Agents to route communications to
Vault clusters via the Airborne Network
▪ Allows Vault Agent to sync ad hoc
with Vault performance secondaries
via TTNT, WNW to Airborne Network
routers when available
▪ Minimize round trip delay and provide
additional options for Vault replication
reference architectures
TTNT = Tactical Targeting Network Technology
WNW = Wideband Network Waveform
Secrets Management in
Adverse Conditions
When in periods of reliable/semi-reliable
connectivity, use Consul + Vault Agent
Caching and Templating to reflect the active
state of secrets in the primary within files local
to the edge system.
Vault Agent
(/foo/bar, value_1)
Secondary Cluster
(/foo/bar, value_1)
Primary Cluster
(/foo/bar, value_1)
Reliable/Semi-Reliable Connectivity
Secrets Management in Adverse Conditions
When outside the range of connectivity,
Vault Agent Caching & Templating retains
the last known version of K/V in the linked
file that references the secret.
This ensures continued access for local
applications at the edge while the
secondary cluster remains disconnected
in the field.
Secondary Cluster
(/foo/bar, value_1)
Primary Cluster
(/foo/bar, value_1)
Reliable/Semi-Reliable
Connectivity
Vault Agent
(/foo/bar, value_1)
?
Secrets Management in Adverse Conditions
When TTL expires and/or operator thinks edge
compromised, primary iterates K/V version with
new value
▪ Agent is unable to retrieve an update to their K/V
pair until they re-enter connectivity with a
connected secondary and reauthenticate.
▪ Resilience against compromise of edge system.
Compromises isolated at the edge.
▪ Ensures primary/connected secondaries can still
reference previous K/V pair via previous versions.
Connected Secondary
V1: (/foo/bar, value_2),
V0: (/foo/bar, value_1)
Primary Cluster
V1: (/foo/bar, value_2),
V0: (/foo/bar, value_1)
Reliable/Semi-Reliable Connectivity
Disconnected
Secondary
(/foo/bar, value_1)
Vault Agent
(/foo/bar, value_1)
Secrets Management in
Adverse Conditions
When reliable/semi-reliable connectivity
re-established, use Vault Agent Templating and
Vault Replication to reflect the active state of
secrets in the primary within files local to the
edge system.
Reliable/Semi-Reliable Connectivity
Connected Secondary
V1: (/foo/bar, value_2)
V0: (/foo/bar, value_1)
Primary Cluster
V1: (/foo/bar, value_2)
V0: (/foo/bar, value_1)
Vault Agent
V1: (/foo/bar, value_2)
V0: (/foo/bar, value_1)
Secrets Management for Tactical Systems
Vault and Consul: Providing secure
edge computing to warfighters
Provide secrets management to tactical units for
battlefield management and secure communication
workflows
▪ Operable in Isolation
Operational in the face of long-term losses of
connectivity with infrastructure
▪ Resilient
Secure against possible physical compromise
▪ Easy to Use
Requires little/no development support from warfighter
users
Secrets Management for Tactical Systems
Providing secure edge computing to
warfighters
Provide secrets management to tactical units for
battlefield management and secure communication
workflows
Solution: Vault + Consul
www.hashicorp.com
hello@hashicorp.co
m
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
 
Consul 1.6: Layer 7 Traffic Management and Mesh Gateways
Consul 1.6: Layer 7 Traffic Management and Mesh GatewaysConsul 1.6: Layer 7 Traffic Management and Mesh Gateways
Consul 1.6: Layer 7 Traffic Management and Mesh GatewaysMitchell Pronschinske
 
Demystifying Terraform 012
Demystifying Terraform 012Demystifying Terraform 012
Demystifying Terraform 012Stenio Ferreira
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud worldLew Tucker
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Stenio Ferreira
 
Self-Driving Storage and Applications Integration
Self-Driving Storage and Applications IntegrationSelf-Driving Storage and Applications Integration
Self-Driving Storage and Applications IntegrationMarketingArrowECS_CZ
 
StorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UK
StorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UKStorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UK
StorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UKStorageOS
 
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!ITCamp
 
Microsoft Azure Stack in Tunisia
Microsoft Azure Stack in TunisiaMicrosoft Azure Stack in Tunisia
Microsoft Azure Stack in TunisiaAymen Mami
 
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesGDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesJames Anderson
 
Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185jtaylor707
 
Hashicorp Corporate and Product Overview
Hashicorp Corporate and Product OverviewHashicorp Corporate and Product Overview
Hashicorp Corporate and Product OverviewStenio Ferreira
 
Multiple ways of building hybrid clouds on Kubernetes
Multiple ways of building hybrid clouds on KubernetesMultiple ways of building hybrid clouds on Kubernetes
Multiple ways of building hybrid clouds on KubernetesJanos Matyas
 
AWS re:Invent 2016 - Scality's Open Source AWS S3 Server
AWS re:Invent 2016 - Scality's Open Source AWS S3 ServerAWS re:Invent 2016 - Scality's Open Source AWS S3 Server
AWS re:Invent 2016 - Scality's Open Source AWS S3 ServerScality
 
How to protect your IoT data on AWS
How to protect your IoT data on AWSHow to protect your IoT data on AWS
How to protect your IoT data on AWSLahav Savir
 
Vault Open Source vs Enterprise v2
Vault Open Source vs Enterprise v2Vault Open Source vs Enterprise v2
Vault Open Source vs Enterprise v2Stenio Ferreira
 

Was ist angesagt? (20)

Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 
Consul 1.6: Layer 7 Traffic Management and Mesh Gateways
Consul 1.6: Layer 7 Traffic Management and Mesh GatewaysConsul 1.6: Layer 7 Traffic Management and Mesh Gateways
Consul 1.6: Layer 7 Traffic Management and Mesh Gateways
 
F5 Automation Toolchain
F5 Automation ToolchainF5 Automation Toolchain
F5 Automation Toolchain
 
Integrating Terraform and Consul
Integrating Terraform and ConsulIntegrating Terraform and Consul
Integrating Terraform and Consul
 
Demystifying Terraform 012
Demystifying Terraform 012Demystifying Terraform 012
Demystifying Terraform 012
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
 
Self-Driving Storage and Applications Integration
Self-Driving Storage and Applications IntegrationSelf-Driving Storage and Applications Integration
Self-Driving Storage and Applications Integration
 
Preparing for Multi-Cloud
Preparing for Multi-CloudPreparing for Multi-Cloud
Preparing for Multi-Cloud
 
StorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UK
StorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UKStorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UK
StorageOS, Storage for Containers Shouldn't Be Annoying at Container Camp UK
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
ITCamp 2018 - Thomas Maurer - Azure Stack - Everything you need to know!
 
Microsoft Azure Stack in Tunisia
Microsoft Azure Stack in TunisiaMicrosoft Azure Stack in Tunisia
Microsoft Azure Stack in Tunisia
 
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesGDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
 
Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185
 
Hashicorp Corporate and Product Overview
Hashicorp Corporate and Product OverviewHashicorp Corporate and Product Overview
Hashicorp Corporate and Product Overview
 
Multiple ways of building hybrid clouds on Kubernetes
Multiple ways of building hybrid clouds on KubernetesMultiple ways of building hybrid clouds on Kubernetes
Multiple ways of building hybrid clouds on Kubernetes
 
AWS re:Invent 2016 - Scality's Open Source AWS S3 Server
AWS re:Invent 2016 - Scality's Open Source AWS S3 ServerAWS re:Invent 2016 - Scality's Open Source AWS S3 Server
AWS re:Invent 2016 - Scality's Open Source AWS S3 Server
 
How to protect your IoT data on AWS
How to protect your IoT data on AWSHow to protect your IoT data on AWS
How to protect your IoT data on AWS
 
Vault Open Source vs Enterprise v2
Vault Open Source vs Enterprise v2Vault Open Source vs Enterprise v2
Vault Open Source vs Enterprise v2
 

Ähnlich wie Military Edge Computing with Vault and Consul

[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업OpenStack Korea Community
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůMarketingArrowECS_CZ
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the CloudRobert Parker
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalablePallavi Vyas
 
Cozystack: Free PaaS platform and framework for building clouds
Cozystack: Free PaaS platform and framework for building cloudsCozystack: Free PaaS platform and framework for building clouds
Cozystack: Free PaaS platform and framework for building cloudsAndrei Kvapil
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbOri Guez
 
Easy, Secure, and Fast: Using NATS.io for Streams and Services
Easy, Secure, and Fast: Using NATS.io for Streams and ServicesEasy, Secure, and Fast: Using NATS.io for Streams and Services
Easy, Secure, and Fast: Using NATS.io for Streams and ServicesNATS
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxYitao Cen
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud ADVA
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
Jimbob's Towing and Wrecker Services Presentation
Jimbob's Towing and Wrecker Services PresentationJimbob's Towing and Wrecker Services Presentation
Jimbob's Towing and Wrecker Services PresentationTony DeGonia (LION)
 
XO Enterprise Cloud
XO Enterprise CloudXO Enterprise Cloud
XO Enterprise CloudMari Hansen
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...ADVA
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetNuno Alves
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedis Labs
 

Ähnlich wie Military Edge Computing with Vault and Consul (20)

[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
[OpenStack Days Korea 2016] Track2 - 가상화 네트워크와 클라우드간 협업
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerů
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the Cloud
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely Scalable
 
Intermedia Overview
Intermedia OverviewIntermedia Overview
Intermedia Overview
 
Cozystack: Free PaaS platform and framework for building clouds
Cozystack: Free PaaS platform and framework for building cloudsCozystack: Free PaaS platform and framework for building clouds
Cozystack: Free PaaS platform and framework for building clouds
 
cloudblanket_nms_ds_revb
cloudblanket_nms_ds_revbcloudblanket_nms_ds_revb
cloudblanket_nms_ds_revb
 
Easy, Secure, and Fast: Using NATS.io for Streams and Services
Easy, Secure, and Fast: Using NATS.io for Streams and ServicesEasy, Secure, and Fast: Using NATS.io for Streams and Services
Easy, Secure, and Fast: Using NATS.io for Streams and Services
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
JWTS Presentation
JWTS PresentationJWTS Presentation
JWTS Presentation
 
Jimbob's Towing and Wrecker Services Presentation
Jimbob's Towing and Wrecker Services PresentationJimbob's Towing and Wrecker Services Presentation
Jimbob's Towing and Wrecker Services Presentation
 
XO Enterprise Cloud
XO Enterprise CloudXO Enterprise Cloud
XO Enterprise Cloud
 
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (...
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Citrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheetCitrix cloud platform 4.2 data sheet
Citrix cloud platform 4.2 data sheet
 
Cloud management
Cloud managementCloud management
Cloud management
 
RedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in EquinixRedisConf17 - Explosion of Data at the Edge in Equinix
RedisConf17 - Explosion of Data at the Edge in Equinix
 

Mehr von Mitchell Pronschinske

Dynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD PipelinesDynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD PipelinesMitchell Pronschinske
 
Migrating from VMs to Kubernetes using HashiCorp Consul Service on Azure
Migrating from VMs to Kubernetes using HashiCorp Consul Service on AzureMigrating from VMs to Kubernetes using HashiCorp Consul Service on Azure
Migrating from VMs to Kubernetes using HashiCorp Consul Service on AzureMitchell Pronschinske
 
Empowering developers and operators through Gitlab and HashiCorp
Empowering developers and operators through Gitlab and HashiCorpEmpowering developers and operators through Gitlab and HashiCorp
Empowering developers and operators through Gitlab and HashiCorpMitchell Pronschinske
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpMitchell Pronschinske
 
Using new sentinel features in terraform cloud
Using new sentinel features in terraform cloudUsing new sentinel features in terraform cloud
Using new sentinel features in terraform cloudMitchell Pronschinske
 
Unlocking the Cloud operating model with GitHub Actions
Unlocking the Cloud operating model with GitHub ActionsUnlocking the Cloud operating model with GitHub Actions
Unlocking the Cloud operating model with GitHub ActionsMitchell Pronschinske
 
Cisco ACI with HashiCorp Terraform (APAC)
Cisco ACI with HashiCorp Terraform (APAC)Cisco ACI with HashiCorp Terraform (APAC)
Cisco ACI with HashiCorp Terraform (APAC)Mitchell Pronschinske
 
Governance for Multiple Teams Sharing a Nomad Cluster
Governance for Multiple Teams Sharing a Nomad ClusterGovernance for Multiple Teams Sharing a Nomad Cluster
Governance for Multiple Teams Sharing a Nomad ClusterMitchell Pronschinske
 
Unlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: DeploymentUnlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: DeploymentMitchell Pronschinske
 
Keeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp VaultKeeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp VaultMitchell Pronschinske
 
Modern Scheduling for Modern Applications with Nomad
Modern Scheduling for Modern Applications with NomadModern Scheduling for Modern Applications with Nomad
Modern Scheduling for Modern Applications with NomadMitchell Pronschinske
 
Moving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on AzureMoving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on AzureMitchell Pronschinske
 
Rapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid EnvironmentsRapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid EnvironmentsMitchell Pronschinske
 
Understanding Service Mesh on Azure with HashiCorp Consul
Understanding Service Mesh on Azure with HashiCorp ConsulUnderstanding Service Mesh on Azure with HashiCorp Consul
Understanding Service Mesh on Azure with HashiCorp ConsulMitchell Pronschinske
 
Intermediate HCL: Configuration Languages in HCL2
Intermediate HCL: Configuration Languages in HCL2Intermediate HCL: Configuration Languages in HCL2
Intermediate HCL: Configuration Languages in HCL2Mitchell Pronschinske
 

Mehr von Mitchell Pronschinske (20)

Code quality for Terraform
Code quality for TerraformCode quality for Terraform
Code quality for Terraform
 
Dynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD PipelinesDynamic Azure Credentials for Applications and CI/CD Pipelines
Dynamic Azure Credentials for Applications and CI/CD Pipelines
 
Migrating from VMs to Kubernetes using HashiCorp Consul Service on Azure
Migrating from VMs to Kubernetes using HashiCorp Consul Service on AzureMigrating from VMs to Kubernetes using HashiCorp Consul Service on Azure
Migrating from VMs to Kubernetes using HashiCorp Consul Service on Azure
 
Empowering developers and operators through Gitlab and HashiCorp
Empowering developers and operators through Gitlab and HashiCorpEmpowering developers and operators through Gitlab and HashiCorp
Empowering developers and operators through Gitlab and HashiCorp
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
 
Using new sentinel features in terraform cloud
Using new sentinel features in terraform cloudUsing new sentinel features in terraform cloud
Using new sentinel features in terraform cloud
 
Unlocking the Cloud operating model with GitHub Actions
Unlocking the Cloud operating model with GitHub ActionsUnlocking the Cloud operating model with GitHub Actions
Unlocking the Cloud operating model with GitHub Actions
 
Unlocking the Cloud Operating Model
Unlocking the Cloud Operating ModelUnlocking the Cloud Operating Model
Unlocking the Cloud Operating Model
 
Cisco ACI with HashiCorp Terraform (APAC)
Cisco ACI with HashiCorp Terraform (APAC)Cisco ACI with HashiCorp Terraform (APAC)
Cisco ACI with HashiCorp Terraform (APAC)
 
Governance for Multiple Teams Sharing a Nomad Cluster
Governance for Multiple Teams Sharing a Nomad ClusterGovernance for Multiple Teams Sharing a Nomad Cluster
Governance for Multiple Teams Sharing a Nomad Cluster
 
Unlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: DeploymentUnlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: Deployment
 
Keeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp VaultKeeping a Secret with HashiCorp Vault
Keeping a Secret with HashiCorp Vault
 
Modern Scheduling for Modern Applications with Nomad
Modern Scheduling for Modern Applications with NomadModern Scheduling for Modern Applications with Nomad
Modern Scheduling for Modern Applications with Nomad
 
Moving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on AzureMoving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on Azure
 
Remote Culture at HashiCorp
Remote Culture at HashiCorpRemote Culture at HashiCorp
Remote Culture at HashiCorp
 
Rapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid EnvironmentsRapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid Environments
 
Vault 1.4 launch webinar
Vault 1.4  launch webinar Vault 1.4  launch webinar
Vault 1.4 launch webinar
 
Understanding Service Mesh on Azure with HashiCorp Consul
Understanding Service Mesh on Azure with HashiCorp ConsulUnderstanding Service Mesh on Azure with HashiCorp Consul
Understanding Service Mesh on Azure with HashiCorp Consul
 
From Terraform OSS to Enterprise
From Terraform OSS to EnterpriseFrom Terraform OSS to Enterprise
From Terraform OSS to Enterprise
 
Intermediate HCL: Configuration Languages in HCL2
Intermediate HCL: Configuration Languages in HCL2Intermediate HCL: Configuration Languages in HCL2
Intermediate HCL: Configuration Languages in HCL2
 

Kürzlich hochgeladen

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Kürzlich hochgeladen (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

Military Edge Computing with Vault and Consul

  • 1. Copyright © 2019 HashiCorp Securing The Edge: Military Computing Systems Timothy J. Olson - SE, Public Sector
  • 2. Secrets Management for Tactical Systems Providing secure edge computing to warfighters Provide secrets management to tactical units for battlefield management and secure communication workflows ▪ Operable in Isolation Operational in the face of long-term losses of connectivity with infrastructure ▪ Resilient Secure against possible physical compromise ▪ Easy to Use Requires little/no development support from warfighter users
  • 3. Solution: Vault + Consul Leverage Vault and Consul to provide highly available, resilient, and secure access to tactical computing systems at the edge ▪ Centrally manage and distribute K/V secrets to warfighters using Vault Agent Caching and Templating ▪ Replicate secrets and perform distributed consensus via Vault Replication ▪ Leverage Consul to perform service discovery and networking of Vault across tactical IP networks
  • 4. Evolving application workload delivery Challenge How to deliver Enterprise to Edge applications securely and consistently? Solution Embracing a new operating model for dynamic cloud architectures: a cloud operating model. PHYSICAL VMs CONTAINERS SERVICES APP SERVER CLOUD NATIVE SERVERLESS EDGE DEVICES Run Development Connect Networking Secure Security Provision Operations Dedicated Infrastructure Scheduled across the fleet Host-based Static IP Service-based Dynamic IP High trust IP-based Low trust Identity-based Dedicated servers Homogeneous Capacity on-demand Heterogeneous STATIC/FIXED DYNAMIC
  • 5. Evolving application workload delivery vSphere Hardware IP: Hardware vCenter vSphere Various Hardware Identity: AD/LDAP Terraform EKS / ECS Lambda CloudApp/ AppMesh Identity: AWS IAM Cloud Formation AKS / ACS Azure Functions Proprietary Identity: Azure AD Resource Manager GKE Cloud Functions Proprietary Identity: GCP IAM Cloud Dep. Manager Challenge How to deliver Enterprise to Edge applications securely and consistently? PHYSICAL VMs CONTAINERS SERVICES APP SERVER CLOUD NATIVE SERVERLESS EDGE DEVICES Solution Proprietary solutions reduce flexibility and creates complexity across vendors Run Development Connect Networking Secure Security Provision Operations DEDICATED HYBRID/MULTI CLOUD EDGEENTERPRISE
  • 6. Evolving application workload delivery Networking Security Infrastructure Orchestration Challenge How to deliver Enterprise to Edge applications securely and consistently? Solution Establish central shared service platforms with a single control plane, and consistent workflows. PHYSICAL VMs CONTAINERS SERVICES APP SERVER CLOUD NATIVE SERVERLESS EDGE DEVICES EDGEENTERPRISE
  • 7. A Common Operating Model with the HashiCorp Suite Provision Operations Secure Security Connect Networking Run Development Private Cloud AWS Azure GCP
  • 8. Cloud Operating Model Shared Services Multi Cloud Infrastructure Automation — Infrastructure as code Compliance & management Self service infrastructure Provision / Operations Multi Cloud Security Automation — Identity-based security Secrets management Encryption as a service Advanced data protection Secure / Security Multi Cloud Networking Automation — Common service registry Service registry and discovery Network middleware automation Service mesh Connect / Networking Multi Cloud Application Automation — Workload orchestration Container orchestration Heterogeneous orchestration Run / Development
  • 9. Vault: Security Automation Provides the foundation for cloud security that uses trusted sources of identity to keep secrets and application data secure in the cloud operating model Secrets management to centrally store and protect secrets across clouds and applications Data encryption to keep application data secure across environments and workloads Advanced Data Protection to secure workloads and data across traditional systems, clouds, and infrastructure.
  • 10. Vault: Hybrid / Multi-Cloud Security Secure Multi Cloud Security ● Hybrid / Multi Cloud Secrets Management ○ Enables teams to securely store and tightly control access to tokens, passwords, certificates, and encryption keys for protecting machines and application ● EaaS: Encryption as a Service
  • 11. Single Control Plane for cloud security ● Automate, control, and secure infrastructure and applications through one API ● Unified support across heterogeneous environments ● Integrate with providers and technologies you’re already using
  • 12. © 2018 HashiCorp Vault Agent VAULT APPROACH TO DYNAMIC INFRASTRUCTURE 12 Vault Agent is a client daemon that provides the following features: ● Auto-Auth - Automatically authenticate to Vault and manage the token renewal process for locally-retrieved dynamic secrets. ● Caching - Allows client-side caching of responses containing newly created tokens and responses containing leased secrets generated off of these newly created tokens. ● Templating - Allows rendering of user supplied templates by Vault Agent, using the token generated by the Auto-Auth step.
  • 13. © 2018 HashiCorp Vault Agent Caching VAULT APPROACH TO DYNAMIC INFRASTRUCTURE 13 Vault Agent Caching can cache the tokens and leased secrets proxied through the agent which includes the auto-auth token. This allows for easier access to Vault secrets for edge applications, reduces the I/O burden for basic secrets access for Vault clusters, and allows for secure local access to leased secrets for the life of a valid token
  • 14. © 2018 HashiCorp Vault Agent Templates VAULT APPROACH TO DYNAMIC INFRASTRUCTURE 14 Vault Agent Templates allows Vault secrets to be rendered to files using the Consul Template markup language. This significantly simplifies the workflow when you are integrating your applications with Vault.
  • 15. Consul Provides a foundation of cloud network automation using a shared registry for service based networking 50k+ Used at scale with 50k+ agents 1M+ Monthly D/Ls Service registry & health monitoring to provide a real-time directory of all services with their health status Network middleware automation with service discovery for dynamic reconfiguration as services scale up, down or move Zero trust network with service mesh to secure service-to-service traffic with identity-based security policies and encrypted traffic with Mutual-TLS
  • 16. The Shift from Static to Dynamic Networking ● Modular services with dynamic IPs, running on bare metals, VMs, containers... ● 85% of volume from complex east-west traffic* ● No clear network perimeters
  • 17. Consul: Hybrid / Multi-Cloud Service Networking (MESH) Connect Hybrid/Multi Cloud Service Networking ● Consul provides a hybrid/multi-cloud service networking layer to connect and secure services ● Service Registry & Discovery ○ Common service registry ○ Integrated health checks ○ DNS and API interfaces to enable any service to discover and be discovered by other services. ● Consistent registry and discovery of services across multi-data center, cloud, and platform environments. ● Service Mesh ○ Consul provides a distributed service mesh to connect, secure, and configure services across any runtime platform and cloud.
  • 18. Consul Connect Consul Connect provides service-to-service connection authorization and encryption using mutual Transport Layer Security (TLS). Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all. Applications may also natively integrate with Connect for optimal performance and security. Connect can help you secure your services and provide data about service-to-service communications. Secure service-to-service traffic with identity-based security policies and encrypted traffic with Mutual-TLS
  • 19. Single Control Plane for cloud networking ● Automate and control the data plane with central service registry ● Unified support across heterogeneous environment ● Simplified operation with single workflow
  • 20. Unified Networking Solution for Hybrid/Multi-Cloud
  • 21. Vault Replication for Military Systems Leverage Vault Replication to allow edge-based warfighting systems to perform secrets management with centralized Vault environments. ▪ Primary: Source of truth located in central ship or land-based command operations center. ▪ Secondaries: Located at mobile C2I centers that can connect directly to edge systems. ▪ Vault Agent: Deployed on edge warfighting systems for local secrets management operations using K/V. Primary Vault Cluster Land or naval command operations centers Vault Performance Secondary Mobile C2I such as E3 or M1113 Vault Agent Edge system that uses Vault K/V
  • 22. Mesh Networking with Consul Connect Using Consul Connect will allow Vault Agents to route communications to Vault clusters via the Airborne Network ▪ Allows Vault Agent to sync ad hoc with Vault performance secondaries via TTNT, WNW to Airborne Network routers when available ▪ Minimize round trip delay and provide additional options for Vault replication reference architectures TTNT = Tactical Targeting Network Technology WNW = Wideband Network Waveform
  • 23. Secrets Management in Adverse Conditions When in periods of reliable/semi-reliable connectivity, use Consul + Vault Agent Caching and Templating to reflect the active state of secrets in the primary within files local to the edge system. Vault Agent (/foo/bar, value_1) Secondary Cluster (/foo/bar, value_1) Primary Cluster (/foo/bar, value_1) Reliable/Semi-Reliable Connectivity
  • 24. Secrets Management in Adverse Conditions When outside the range of connectivity, Vault Agent Caching & Templating retains the last known version of K/V in the linked file that references the secret. This ensures continued access for local applications at the edge while the secondary cluster remains disconnected in the field. Secondary Cluster (/foo/bar, value_1) Primary Cluster (/foo/bar, value_1) Reliable/Semi-Reliable Connectivity Vault Agent (/foo/bar, value_1) ?
  • 25. Secrets Management in Adverse Conditions When TTL expires and/or operator thinks edge compromised, primary iterates K/V version with new value ▪ Agent is unable to retrieve an update to their K/V pair until they re-enter connectivity with a connected secondary and reauthenticate. ▪ Resilience against compromise of edge system. Compromises isolated at the edge. ▪ Ensures primary/connected secondaries can still reference previous K/V pair via previous versions. Connected Secondary V1: (/foo/bar, value_2), V0: (/foo/bar, value_1) Primary Cluster V1: (/foo/bar, value_2), V0: (/foo/bar, value_1) Reliable/Semi-Reliable Connectivity Disconnected Secondary (/foo/bar, value_1) Vault Agent (/foo/bar, value_1)
  • 26. Secrets Management in Adverse Conditions When reliable/semi-reliable connectivity re-established, use Vault Agent Templating and Vault Replication to reflect the active state of secrets in the primary within files local to the edge system. Reliable/Semi-Reliable Connectivity Connected Secondary V1: (/foo/bar, value_2) V0: (/foo/bar, value_1) Primary Cluster V1: (/foo/bar, value_2) V0: (/foo/bar, value_1) Vault Agent V1: (/foo/bar, value_2) V0: (/foo/bar, value_1)
  • 27. Secrets Management for Tactical Systems Vault and Consul: Providing secure edge computing to warfighters Provide secrets management to tactical units for battlefield management and secure communication workflows ▪ Operable in Isolation Operational in the face of long-term losses of connectivity with infrastructure ▪ Resilient Secure against possible physical compromise ▪ Easy to Use Requires little/no development support from warfighter users
  • 28. Secrets Management for Tactical Systems Providing secure edge computing to warfighters Provide secrets management to tactical units for battlefield management and secure communication workflows Solution: Vault + Consul