Skip to main content
HashiConf More sessions have been added to the conference agenda. Buy your pass and plan your schedule. Register
Presentation

Secure Developer Workflows with Vault & Github Actions

Secure secrets management is a critical element of the product development lifecycle. It’s not trivial, however, to protect and manage cloud providers and other important credentials at all stages of the process. As a result, developer machines are often littered with secrets stored in unencrypted text files, and deployment pipelines are complicated by a variety of patterns for retrieving secrets. Hashicorp Vault provides an elegant secret management system that you can use to easily and consistently safeguard your local development environment as well as your entire deployment pipeline. In this talk, I will show how you can set up a secure development environment with Vault, and how you can ensure your secrets & application deployment patterns stay consistent across development, staging and production environments using GitHub Actions.

Secure secrets management is a critical element of the product development lifecycle. It’s not trivial, however, to protect and manage cloud providers and other important credentials at all stages of the process. As a result, developer machines are often littered with secrets stored in unencrypted text files, and deployment pipelines are complicated by a variety of patterns for retrieving secrets.

Hashicorp Vault provides an elegant secret management system that you can use to easily and consistently safeguard your local development environment as well as your entire deployment pipeline.

In this talk, I will show how you can set up a secure development environment with Vault, and how you can ensure your secrets & application deployment patterns stay consistent across development, staging and production environments using GitHub Actions.

More resources like this one

  • 4/11/2024
  • FAQ
Introduction to HashiCorp Vault
Vault identity diagram
  • 12/28/2023
  • FAQ
Why should we use identity-based or "identity-first" security as we adopt cloud infrastructure?
  • 3/28/2023
  • Presentation
Hidden Hazards: Unique Burnout Risks in Tech
  • 3/28/2023
  • Presentation
Vault and Boundary - Managing Secrets at Home