Learn how to design permissions with AWS and use HashiCorp Vault to generate access and secret keys.
Many engineers encounter complexity while managing access and secret keys for public cloud environments. Most of the time, developers are given permissions to create their own sets of keys and use them wherever they want to, without any oversight. This could potentially lead to scenarios where the keys might be uploaded accidentally to Git repositories or be hardcoded within the app itself.
In this talk, Shrivatsa Upadhye will focus, with the help of a demo, on how you can leverage HashiCorp Vault to manage the ENTIRE lifecycle of keys used within AWS, which includes creation, deletion, expiration, logging, and rotation of access and secret keys—a crucial component in building secure cloud infrastructure.
Automating Multi-Cloud, Multi-Region Vault for Teams and Landing Zones
How Discover Manages 2000+ Terraform Enterprise Workspaces
Architecting Geo-Distributed Mobile Edge Applications with Consul
A Field Guide to Zero Trust Security in the Public Sector