HashiCorp Vault adds cross-platform product innovations with an emphasis on resolving secrets sprawl.
Today at HashiConf, we are pleased to announce the alpha program for HashiCorp Cloud Platform (HCP) Vault Radar, HCP Vault Secrets general availability, secrets sync beta for Vault Enterprise, and HashiCorp Vault 1.15. These new capabilities help organizations secure their applications and services as they leverage a cloud operating model to power their shift to the cloud. Enabling a cloud operating model helps organizations cut costs, reduce risks, and increase the speed at which developers build and deploy secure applications.
The new capabilities boost Vault’s focus on helping organizations use identity to achieve their security goals by:
Below is a closer look at each of the Vault announcements made at HashiConf:
Organizations can significantly reduce their attack surface by leveraging Vault to manage secrets, enforce authentication, and rotate credentials regularly. However, many enterprises struggle with the step before secrets management: finding all of the untracked secrets sprawled across their IT estates.
In June, HashiCorp announced the acquisition of BluBracket, a company that focused on enabling customers to scan, identify, and remediate secrets inadvertently stored in source code, development environments, internal wikis, chat services, and ticketing systems. Secret scanning is essential for organizations working to control secret sprawl without compromising efficiency, speed, and innovation. Today, we’re updating the HashiCorp community on our progress integrating BluBracket technology into the HashiCorp product line.
The initial deliverable built from the BluBracket acquisition is called HCP Vault Radar. Additionally, we have successfully integrated Vault Radar’s secret detection functionality in Git-based version control systems, AWS Configuration Manager, and directory structures in the HCP ecosystem.
HCP Vault Radar automates the detection and identification of unmanaged secrets so that security teams can take appropriate actions to remediate issues. It scans for the following types of information, then categorizes and ranks what's discovered by risk.
HCP Vault Radar also protects code from leaking into public repositories and helps prevent secrets and intellectual property from getting into the wrong hands. HCP Vault Radar works across multiple Git providers, integrates with enterprise CI/CD tools, version control, code servers, identity and access management (IAM) systems, messaging, ticketing, and many other IT resources.
Organizations interested in testing these new features can request to be a part of our early access program. HCP Vault Radar is scheduled to be released in beta in January 2024 and we anticipate general availability later in 2024.
HCP Vault Secrets — generally available today — is a new software-as-a-service (SaaS) offering of HashiCorp Vault focusing primarily on secrets management. HCP Vault Secrets was released in beta earlier this year as an even faster, simpler way for users to onboard with Vault secrets management. The general availability builds on the beta release with production-ready secrets management capabilities, additional secrets sync destinations, and multiple consumption tiers.
HCP Vault Secrets sharpens the focus on secrets management with three key benefits:
Learn more: HCP Vault Secrets is now generally available
Cloud secrets sync, previously available only in HCP Vault Secrets, is now available as a beta feature in Vault Enterprise 1.15. Secrets sync allows platform teams to centralize their secrets management while still letting developers easily consume secrets as needed within the applications they use every day.
As more and more organizations adopt a multi-cloud approach, they face challenges around isolated secrets management, compliance, and reporting tools, as well as protecting expanded attack surfaces. Isolated secrets management solutions are primarily concerned with unifying secrets across solutions that are specific to their own platform, which can’t provide a complete solution and therefore is not suitable for multi-cloud environments. They also lose the ability to centrally provision and rotate secrets based on the best practices they’ve established. That leaves organizations faced with leveraging multiple logging tools to show auditors that they are within compliance. Finally, multi-cloud environments present a larger attack surface, making secrets management and compliance more important than ever.
Vault secrets sync bridges this multi-cloud secrets management divide between solution providers by helping teams update, rotate, and revoke secrets across multiple platforms. Used in conjunction with Vault’s existing automation functionality, secrets sync can execute these tasks automatically. Without secrets sync, organizations’ visibility into their secrets will be fragmented amongst different platforms and create a prohibitive level of risk.
The new Vault secrets sync beta release supports the synchronization of secrets to multiple platforms, and more are planned for the feature’s general availability:
HashiCorp Vault 1.15, released last month, includes a broad range of updates, including new graphical user interfaces, PKI certificate management customizations, and several new beta features. Notable updates include:
New landing page dashboard: Vault 1.15 introduces a landing page dashboard that provides a more comprehensive and unified overview of important information about a Vault instance. From this new view, customers can quickly see key information like client counts and config details and take quick actions.
Certificate issuance external policy service (CIEPS): With the release of CIEPS, Vault enables fine-grained control over issued certificates using custom policies in a customer-defined service outside of Vault. Using CIEPS, customers implement a custom service that can be called by the Vault PKI secrets engine to evaluate and override original certificate-request content. This capability helps customers ensure Vault PKI-issued certificates meet corporate compliance standards.
Vault Enterprise seal high availability (beta): This new feature lets enterprise customers use independent seals retained in multiple key management services (KMS) providers, helping to ensure continuity of business operations.
Event monitoring (beta): This feature, now in beta, lets subscribers register to be notified of changes to their key-value (KV) secrets. Initially released as an alpha feature in Vault 1.13, event monitoring now adds full policy support, namespaces, and an API.
The new options for identity-based security with HashiCorp Vault — including HCP Vault Radar, HCP Vault Secrets, Vault Enterprise secrets sync, and other features in Vault 1.15 — fight secret sprawl, reduce operational costs, improve speed of delivery, and lower risk in multiple ways. They also provide the flexibility to choose cloud-based multi-tenant or dedicated approaches, self-managed or HashiCorp-managed, and Vault community options to fit your organizational standards and preferences.
For more information about the latest releases of Vault Enterprise, visit the Vault Enterprise release page. To learn more about HCP Vault and Vault Enterprise, or to get started with HashiCorp Vault, visit the Vault product page and contact HashiCorp Sales.
In this blog post, we’ll look at practical public key certificate management in HashiCorp Vault using dynamic secrets rotation.
Discover how HashiCorp Developer Advocate Rosemary Wang uses HashiCorp Boundary on live streams to automate access to servers and record commands to build into future automation.
Eight new HashiCorp Vault ecosystem integrations extend security use cases for customers.