Security Field Day: Zero Trust Security for Multi-Cloud

Learn how HashiCorp Vault, Consul, and Boundary work together to help users achieve a zero trust security framework for multi-cloud.

HashiCorp Developer Advocate, Rob Barnes, and Product Marketing Director, Megan LaFlamme, present HashiCorp’s zero trust security approach through a series of product demos. 

Here are the four sessions from HashiCorp that aired during security field day:

»Zero Trust Security Overview

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. 

In this presentation, Megan LaFlamme, Director, Product Marketing, will introduce HashiCorp’s approach to zero trust security with identity-based access and authorization.

»HashiCorp Vault: Machine Authentication & Authorization

HashiCorp Vault provides the foundation for modern multi-cloud security. It was purpose-built in the cloud era to authenticate and access different clouds, systems, and endpoints, and centrally store, access, and deploy secrets (API keys, credentials, etc.). It also provides a simple workflow to encrypt data in flight and at rest. In this presentation HashiCorp Developer Advocate, Rob Barnes will demonstrate how Vault’s machine authentication and authorization capabilities are a key pillar of zero trust security.

»HashiCorp Consul: Machine-to-Machine Access

HashiCorp Consul enforces authentication between applications by ensuring only the right machines are talking to each other. Consul codifies authorization and traffic rules with encrypted traffic while automating identity-based access for maximum scale, efficiency, and security. With Consul, organizations can discover services, automate network configurations, and enable secure connectivity across any cloud or runtime using service mesh. Rob Barnes, Developer Advocate at HashiCorp will demo how Consul enables machine-to-machine access as a key pillar of zero trust security.

»HashiCorp Boundary: Human-to-Machine Access

HashiCorp Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities. In this presentation, Rob Barnes will demo how HashiCorp Boundary secures access to applications and critical systems with fine-grained authorizations that don't require managing credentials or exposing your entire network.

More resources like this one

  • 4/11/2024
  • FAQ

Introduction to HashiCorp Vault

Vault identity diagram
  • 12/28/2023
  • FAQ

Why should we use identity-based or "identity-first" security as we adopt cloud infrastructure?

  • 3/15/2023
  • Case Study

Using Consul Dataplane on Kubernetes to implement service mesh at an Adfinis client

  • 3/14/2023
  • Article

5 best practices for secrets management