Skip to main content
Presentation

Zero Trust Security and Identity Management with Boundary

Learn about the open source tool HashiCorp Boundary, which aims to abstract away much of the complexity of secure access by providing a linear approach in granting and maintaining access to infrastructure resources.

Modern systems and applications are built around resources that require frequent access by users who may be a developer, DevOps engineer, SRE, or sysadmin in the public domain. These resources often reside in private networks that are inaccessible from an outside network. Traditional approaches such as VPNs, bastion hosts, and gateway nodes are often chosen to bridge connections between private and public networks, but these are complex and expensive to setup. Further, individual credentials for each resource (DB credentials, SSH keys, etc.) need to be shared with users. This is not a recommended practice in software development and may result in security breach.

In this context, the talk will discuss the open source tool HashiCorp Boundary, which aims to abstract away much of the complexity by providing a linear approach in granting and maintaining access to infrastructure resources.

More resources like this one

  • 1/20/2023
  • FAQ
Introduction to Zero Trust Security
  • 12/31/2022
  • Presentation
Development Labs on Multi-Arch and Multi-OS environments
  • 12/31/2022
  • Presentation
Acesso Seguro e Unificado a ambientes de dados com Boundary
  • 12/20/2022
  • Presentation
Secure Remote Access with HCP Boundary