Recorded Webinar

Zero Trust Security Roadshow

HashiCorp is excited to announce our next Virtual Day, Zero Trust Security Roadshow, in partnership with AWS, Datadog and Entrust on May 20th, 2021. During this virtual event, speakers including HashiCorp's Co-founder and CTO, Armon Dadgar, will cover best practices across the four foundational categories for identity-driven controls and Zero Trust security: machine authentication and authorization, machine-to-machine access, human authentication and authorization, and human-to-machine access. See below for all recorded sessions from our roadshow.

The Pillars of Zero Trust Security

During this session Armon will discuss what is Zero Trust Security and Zero Trust Networking? How do I do it? and Why should I do it? If you're moving your applications to cloud environments, this is a critical aspect of cloud security that you must understand.. By combining HashiCorp Boundary, Consul, and Vault, we'll evaluate how these new workflows affect the development process, and how we've secured the architecture. We will break this down into how they impact each of the pillars that make zero trust security truly work:

- Machine Authentication & Authorization
- Machine-to-machine access
- Human access and authorization
- Human-to-machine access

  • Armon Dadgar
    Armon DadgarCo-founder & CTO

Achieving Security Goals with Vault and AWS

The migration to cloud means teams and organizations are rethinking how to effectively secure their ephemeral applications and dynamic infrastructure because a perimeter-based security model is no longer enough. By embracing a zero-trust security model based on trusted identities organizations can safely migrate and secure their infrastructure, applications, and data as they move to a hybrid-cloud world.

HashiCorp Vault and AWS have partnered together to enable organizations to leverage zero-trust security across their organization. Learn how Vault and AWS are working together to drive innovative solutions to increase the security of your infrastructure.

  • Aubrey Johnson
    Aubrey JohnsonProduct Marketing Manager
  • Priya Manghnani
    Priya ManghnaniPartner Solutions Architect, AWS

Centralized and Secured Secrets Management Strategy with Entrust

As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies to strengthen security and facilitate auditing and compliance.

This session will look at the growing challenges faced when deploying centralized secrets management tools, how external certificate authorities, both public and private, are integrated and managed, and mitigation strategies to reduce risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.

  • Juan Asenjo, Ph.D.
    Juan Asenjo, Ph.D.Director of Products, Solutions & Partner Marketing, Entrust
  • Charley Chell
    Charley ChellProduct Manager, Entrust

Getting Started with Service Networking & Secrets Management on Cloud

As organizations move towards “cloud”, the importance of building good operating foundations becomes critical in creating scalable and reduced-risk environments. To help customers address the complexity of that challenge, HashiCorp has introduced HashiCorp Cloud Platform. Hear from HashiCorp's Peter McCarron, Sr. Product Marketing Manager, and Justin Weissig, Vault Technical Marketing, as they dive into how you can get started with service networking and secrets management on cloud with HCP.

HashiCorp Cloud Platform (HCP) is HashiCorp’s fully managed platform that helps practitioners deploy and run HashiCorp tools without the operational complexity of running a self-hosted solution. To aid in establishing secure foundations within cloud environments, our first offerings for HCP are Consul and Vault. In this webinar, we’ll explore how those solutions can be used to enable secure service-to-service connectivity and manage application secrets on workloads in AWS.

  • Peter McCarron
    Peter McCarronSr Product Marketing Manager
  • Justin Weissig
    Justin WeissigVault Technical Marketing

Guardrails Using AWS Organizations and Terraform

AWS Organizations is relatively new, having been released in 2017. The evolution from simply being consolidated billing to security controls seemed like a natural progression. In 2021 Organizations is one of the best tools in your arsenal to protect accounts. In this talk we’ll explore the pros and cons of using a feature in AWS Organizations called SCPs ( Security Control Policies ).

SCPs are the most restrictive and broadest net we can cast with regard to the usage of APIs in the AWS control plane. We’ll look to understand how SCPs work, the tooling to configure them, and finally why Terraform is the best option we have to craft these policies. Attendees will leave with a firm understanding of the trade offs as well as a set of recommendations on why they should consider employing this model.

  • Andrew Krug
    Andrew KrugTechnical Evangelist

More resources like this one

Vault identity diagram
  • 12/28/2023
  • FAQ

Why should we use identity-based or "identity-first" security as we adopt cloud infrastructure?

  • 3/15/2023
  • Presentation

Advanced Terraform techniques

  • 3/15/2023
  • Case Study

Using Consul Dataplane on Kubernetes to implement service mesh at an Adfinis client

  • 3/14/2023
  • Article

5 best practices for secrets management