be secret like a ninja with
play

Be secret like a ninja with Mehdi LARUELLE Hashicorp Vault @D2SI - PowerPoint PPT Presentation

Be secret like a ninja with Mehdi LARUELLE Hashicorp Vault @D2SI Whoami ? D2SI Me Mehdi LARUELLE Cloud & Automation @mehdilaruelle Github Access Table of contents Contextualization 1 How does Vault work ? 2 Steps to become a


  1. Be secret like a ninja with Mehdi LARUELLE Hashicorp Vault @D2SI

  2. Whoami ? D2SI Me Mehdi LARUELLE Cloud & Automation @mehdilaruelle

  3. Github Access

  4. Table of contents Contextualization 1 How does Vault work ? 2 Steps to become a ninja 3 Demonstration 4

  5. // Contextualization 1

  6. Problem ? Mail Code

  7. Vault ? Why ?

  8. // How does Vault work ? 2

  9. Methods & Engines Auth methods App Users ● LDAP ● Approle (pipeline) ● RADIUS ● TLS Certificate ● OKTA ● Kubernetes ● JWT ● JWT / OIDC ● Github ● AliCloud / Azure / AWS / GCP ● LDAP

  10. Methods & Engines Secrets engines Dynamic Encryption as Static secrets secrets a Service K/V Cloud Technology Others Transit ● Alicloud ● Active ● PKI Directory ● SSH ● AWS ● GCP ● Consul ● TOTP ● Database ● GCP KMS ● Azure ● Nomad ● RabbitMQ

  11. // Steps to become a ninja 3

  12. Steps to be a ninja Put secrets in Make secrets Encrypt sensitive Find secrets Vault dynamics data

  13. Steps to be a ninja Put secrets in Make secrets Encrypt sensitive Find secrets Vault dynamics data

  14. Approle

  15. How is it working ? 1. Send Secret ID 2. Auth with Approle 3. Get Token 1. Send Role ID 4. Get secrets with Vault token

  16. Steps to be a ninja Put secrets in Make secrets Encrypt sensitive Find secrets Vault dynamics data

  17. Secret as a Service 1.Ask DB credentials 3.Get credentials 5.Ask to revoke credentials 2.Vault create credentials 4.Application use credentials into DB and retrieve it to authenticate into DB s l a i t n e d e r c e k o v e R . 6

  18. Steps to be a ninja Put secrets in Make secrets Find secrets Encrypt data Vault dynamics

  19. EaaS: Encryption as a Service Application A Application B 1.Put raw data 5.Put encrypted data 2.Get encrypted data 6.Get decrypted data 3. Put encrypted data 4. Get encrypted data

  20. Demonstration

  21. To infinity... and beyond! Consul service mesh envconsul and / or consul- template Vault Agent

  22. Question ? The last but not least

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend