Vault Provider
The Vault provider allows Terraform to read from, write to, and congure Hashicorp Vault (https://vaultproject.io/). Important Interacting with Vault from Terraform causes any secrets that you read and write to be persisted in both Terraform's state le and in any generated plan les. For any Terraform module that reads or writes Vault secrets, these les should be treated as sensitive and protected accordingly. This provider serves two pretty-distinct use-cases, which each have their own security trade-os and caveats that are covered in the sections that follow. Consider these carefully before using this provider within your Terraform conguration.
Best Practices
We recommend that you avoid placing secrets in your Terraform cong or state le wherever possible, and if placed there, you take steps to reduce and manage your risk. We have created a practical guide on how to do this with our opensource versions in Best Practices for Using HashiCorp Terraform with HashiCorp Vault: (https://www.youtube.com/watch?v=fOybhcbuxJ0) This webinar walks you through how to protect secrets when using Terraform with Vault. Additional security measures are available in paid Terraform versions as well.
Conguring and Populating Vault
Terraform can be used by the Vault adminstrators to congure Vault and populate it with secrets. In this case, the state and any plans associated with the conguration must be stored and communicated with care, since they will contain in cleartext any values that were written into Vault. Currently Terraform has no mechanism to redact or protect secrets that are provided via conguration, so teams choosing to use Terraform for populating Vault secrets should pay careful attention to the notes on each resource's documentation page about how any secrets are persisted to the state and consider carefully whether such usage is compatible with their