HashiCorpAWS

Part 2: Securing your AWS environment from the ground up with HashiCorp Vault 

Many engineers encounter complexity while managing access and secrets and keys for public cloud environments. Most of the time, developers are given permissions to create their own sets of keys and use them wherever they want to, without any oversight. This could potentially lead to scenarios where the keys might be uploaded accidentally to Git repositories or be hardcoded within the app itself.

In this session , you will learn how you can leverage HashiCorp Vault to manage the entire lifecycle of secrets used within AWS, which includes creation, deletion, expiration, logging, and rotation of access and secret keys—a crucial component in building secure cloud infrastructure.

Next up: Part 3: Connecting and running AWS ECS at scale

Return to main page for AWS Webinar Series

Recording coming soon!

This webinar has concluded. Once the recording has been posted, you’ll be able to see it here. Recordings are usually available 2 - 3 days after the date of the live webinar.

Niteen Kelvekar
Niteen Kelvekar

Partner Solutions Engineer, India

Recording coming soon!

This webinar has concluded. Once the recording has been posted, you’ll be able to see it here. Recordings are usually available 2 - 3 days after the date of the live webinar.