Skip to main content

Vault is a platform for centralized secrets management, encryption as a service, and identity-based access.

Subscribe to Vault RSS

Vault Enterprise 1.20: SCEP, usage reporting, cloud secret imports

Vault 1.20 adds smarter, streamlined security workflows with encryption updates and UX improvements. The Terraform Vault provider adds ephemeral values.

Vault Enterprise 1.20: SCEP, usage reporting, cloud secret imports
Nomad secrets consumption patterns: Vault integration
Nomad secrets consumption patterns: Vault integration

Learn how to consume application secrets in HashiCorp Nomad using HashiCorp Vault.

Secure AI identity with HashiCorp Vault
Secure AI identity with HashiCorp Vault

HashiCorp Vault's dynamic credentials give AI applications traceable, short-lived identities with just-in-time access, replacing risky static credentials. Try our proof-of-concept LangChain application to see how this can work.

SCEP: A bridge from legacy PKI to modern certificate management
SCEP: A bridge from legacy PKI to modern certificate management

Vault Enterprise now supports SCEP, empowering secure certificate enrollment for legacy and device-constrained environments while helping teams plan their evolution to modern protocols like EST and ACME.

Build secure, AI-driven workflows with Terraform and Vault MCP servers
Build secure, AI-driven workflows with Terraform and Vault MCP servers

At AWS Summit New York, HashiCorp introduced new capabilities that bring Terraform, Vault, and Vault Radar into the age of AI agents — advancing secure, automated infrastructure through composable, agentic systems.

HashiCorp Vault lost secrets recovery, explained
HashiCorp Vault lost secrets recovery, explained

Secret recovery provides a delegatable recovery mechanism for restoring deleted or mistakenly changed secrets that prioritizes Vault’s availability.

The unseen risk: Securing NHIs in your infrastructure
The unseen risk: Securing NHIs in your infrastructure

We’re used to tracking every employee. Who they are. What they can access. What systems they touch. But there’s a growing, largely invisible workforce that rarely gets the same scrutiny: non-human identities (NHIs).