Skip to main content

AWS Webinar Series (APJ)

Join our 4-part webinar series. View session details & register below for each session.

HashiCorp & AWS

Part 1: Scaling your adoption of AWS with HashiCorp Terraform

When starting their journey to AWS, many small teams adopt Terraform open source software (OSS) to provision their clouds using infrastructure-as-code (IaC). As teams expand, organizational challenges arise around collaboration, security, compliance and governance. In this webinar, we’ll discuss the benefits that Terraform Cloud offers customers who are considering Terraform as the standard workflow to provision and manage infrastructure in their organization.

Part 2: Securing your AWS environment from the ground up with Vault

Many engineers encounter complexity while managing access and secrets and keys for public cloud environments. Most of the time, developers are given permissions to create their own sets of keys and use them wherever they want to, without any oversight. This could potentially lead to scenarios where the keys might be uploaded accidentally to Git repositories or be hardcoded within the app itself. In this talk, you will learn how you can leverage HashiCorp Vault to manage the ENTIRE lifecycle of secrets used within AWS, which includes creation, deletion, expiration, logging, and rotation of access and secret keys—a crucial component in building secure cloud infrastructure.

Part 3: Connecting and running AWS ECS at scale

Many organizations run their critical workloads on AWS’s Elastic Container Service (ECS) however operating these workloads at scale can become a challenge. Service discovery, connectivity, load balancing and security are some of the areas that can slow down your application development. In this session you’ll see how Consul from HashiCorp can help to address these challenges by providing a standardised platform to discover, connect, automate and secure your workloads running on ECS.

Part 4: Using Boundary to secure access to AWS resources

Traditional approaches like SSH bastion hosts or VPNs require distributing and managing credentials, configuring network controls like firewalls, and exposing the private network. In this session, we'll show you how Boundary from HashiCorp provides a secure way to access hosts and critical systems without having to manage credentials or expose your network.