SlideShare a Scribd company logo
1 of 17
Copyright © 2018 HashiCorp
Dynamic Database
Credentials with
HashiCorp Vault
Copyright © 2018 HashiCorp
• HashiCorp solutions engineer based in Austin, Texas
• Learned to type on a manual typewriter
• Recovering system administrator
• Enjoys building robots and automated things
• Likes yoga and making pizzas
• Github username: scarolan
Sean Carolan - HashiCorp Solutions Engineer
2
Triple Rainbow all the way
across the sky…
Copyright © 2017 HashiCorp
Company overview
3
Mission
Key
Products
Founded 2012 by Mitchell Hashimoto and Armon Dadgar
We enable organizations to Provision, Secure, Connect,
and Run any infrastructure for any application
Copyright © 2018 HashiCorp
Penetration Testing
4
Copyright © 2018 HashiCorp
Zoom…
5
Copyright © 2018 HashiCorp
…Enhance
6
Username: admin
Password: empire123
Copyright © 2018 HashiCorp
Internet of Things
7
Copyright © 2018 HashiCorp
Stop Password Abuse
8
Copyright © 2018 HashiCorp
Types of Password Abuse
9
• Choosing a weak password
• Sharing passwords with multiple users
• Same password on all the dev servers
• Same passwords on dev/QA/prod
• Password regurgitated into log file
• Same password as you use on your personal accounts
• Stored in plain text on disk in a properties file
• Stored in someone's source code repository
• Stored in the company wiki
• Etc.
Copyright © 2018 HashiCorp
What do the Experts Say?
10
Copyright © 2018 HashiCorp
A Better Way…
11
HashiCorp Vault
Copyright © 2018 HashiCorp
Vault Architecture
12
Copyright © 2018 HashiCorp
Vault Architecture
13
Copyright © 2018 HashiCorp
Vault Architecture
14
Copyright © 2018 HashiCorp
Dynamic Database Workflow
15
s
Copyright © 2018 HashiCorp 16
Live Demo
Thank you.
hello@hashicorp.comwww.hashicorp.com

More Related Content

What's hot

Hashicorp Terraform Open Source vs Enterprise
Hashicorp Terraform Open Source vs EnterpriseHashicorp Terraform Open Source vs Enterprise
Hashicorp Terraform Open Source vs EnterpriseStenio Ferreira
 
Building Hybrid Cloud Architectures with GigaSpaces XAP
Building Hybrid Cloud Architectures with GigaSpaces XAPBuilding Hybrid Cloud Architectures with GigaSpaces XAP
Building Hybrid Cloud Architectures with GigaSpaces XAPjimliddle
 
Cloudian HyperStore Operating Environment
Cloudian HyperStore Operating EnvironmentCloudian HyperStore Operating Environment
Cloudian HyperStore Operating EnvironmentCloudian
 
ActiveSTAK cloud infographic
ActiveSTAK cloud infographicActiveSTAK cloud infographic
ActiveSTAK cloud infographicZunaid Khan
 
Enabling Apache Spark for Hybrid Cloud
Enabling Apache Spark for Hybrid CloudEnabling Apache Spark for Hybrid Cloud
Enabling Apache Spark for Hybrid CloudAlluxio, Inc.
 
Easy and Flexible Application Deployment with HashiCorp Nomad
Easy and Flexible Application Deployment with HashiCorp NomadEasy and Flexible Application Deployment with HashiCorp Nomad
Easy and Flexible Application Deployment with HashiCorp NomadAmanda MacLeod
 
Securing Kubernetes Applications with HashiCorp Vault
Securing Kubernetes Applications with HashiCorp VaultSecuring Kubernetes Applications with HashiCorp Vault
Securing Kubernetes Applications with HashiCorp VaultDevOps.com
 
Cloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the CloudCloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the CloudCloudera, Inc.
 
Moving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on AzureMoving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on AzureMitchell Pronschinske
 
Recover from accidental deletions of your snapshots using recycle bin
Recover from accidental deletions of your snapshots using recycle binRecover from accidental deletions of your snapshots using recycle bin
Recover from accidental deletions of your snapshots using recycle binDhaval Soni
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Presto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data Stores
Presto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data StoresPresto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data Stores
Presto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data StoresAlluxio, Inc.
 
Rapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid EnvironmentsRapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid EnvironmentsMitchell Pronschinske
 
Kubernetes with Docker Enterprise for multi and hybrid cloud strategy
Kubernetes with Docker Enterprise for multi and hybrid cloud strategyKubernetes with Docker Enterprise for multi and hybrid cloud strategy
Kubernetes with Docker Enterprise for multi and hybrid cloud strategyAshnikbiz
 
Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...
Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...
Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...Edureka!
 
Tropos.io - Hadoop in the Cloud - BA4ALL 2016
Tropos.io - Hadoop in the Cloud - BA4ALL 2016Tropos.io - Hadoop in the Cloud - BA4ALL 2016
Tropos.io - Hadoop in the Cloud - BA4ALL 2016Tropos.io
 
A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...
A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...
A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...Amazon Web Services
 
Alibaba Cloud Object Storage Service Meetup
Alibaba Cloud Object Storage Service MeetupAlibaba Cloud Object Storage Service Meetup
Alibaba Cloud Object Storage Service MeetupChirag Nayyar
 
Complex Analytics with NoSQL Data Store in Real Time
Complex Analytics with NoSQL Data Store in Real TimeComplex Analytics with NoSQL Data Store in Real Time
Complex Analytics with NoSQL Data Store in Real TimeNati Shalom
 

What's hot (20)

Hashicorp Terraform Open Source vs Enterprise
Hashicorp Terraform Open Source vs EnterpriseHashicorp Terraform Open Source vs Enterprise
Hashicorp Terraform Open Source vs Enterprise
 
Building Hybrid Cloud Architectures with GigaSpaces XAP
Building Hybrid Cloud Architectures with GigaSpaces XAPBuilding Hybrid Cloud Architectures with GigaSpaces XAP
Building Hybrid Cloud Architectures with GigaSpaces XAP
 
Cloudian HyperStore Operating Environment
Cloudian HyperStore Operating EnvironmentCloudian HyperStore Operating Environment
Cloudian HyperStore Operating Environment
 
ActiveSTAK cloud infographic
ActiveSTAK cloud infographicActiveSTAK cloud infographic
ActiveSTAK cloud infographic
 
Adopting HashiCorp Vault
Adopting HashiCorp VaultAdopting HashiCorp Vault
Adopting HashiCorp Vault
 
Enabling Apache Spark for Hybrid Cloud
Enabling Apache Spark for Hybrid CloudEnabling Apache Spark for Hybrid Cloud
Enabling Apache Spark for Hybrid Cloud
 
Easy and Flexible Application Deployment with HashiCorp Nomad
Easy and Flexible Application Deployment with HashiCorp NomadEasy and Flexible Application Deployment with HashiCorp Nomad
Easy and Flexible Application Deployment with HashiCorp Nomad
 
Securing Kubernetes Applications with HashiCorp Vault
Securing Kubernetes Applications with HashiCorp VaultSecuring Kubernetes Applications with HashiCorp Vault
Securing Kubernetes Applications with HashiCorp Vault
 
Cloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the CloudCloudera Director: Unlock the Full Potential of Hadoop in the Cloud
Cloudera Director: Unlock the Full Potential of Hadoop in the Cloud
 
Moving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on AzureMoving to a Microservice World: Leveraging Consul on Azure
Moving to a Microservice World: Leveraging Consul on Azure
 
Recover from accidental deletions of your snapshots using recycle bin
Recover from accidental deletions of your snapshots using recycle binRecover from accidental deletions of your snapshots using recycle bin
Recover from accidental deletions of your snapshots using recycle bin
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Presto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data Stores
Presto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data StoresPresto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data Stores
Presto: Fast SQL-on-Anything Across Data Lakes, DBMS, and NoSQL Data Stores
 
Rapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid EnvironmentsRapid Infrastructure in Hybrid Environments
Rapid Infrastructure in Hybrid Environments
 
Kubernetes with Docker Enterprise for multi and hybrid cloud strategy
Kubernetes with Docker Enterprise for multi and hybrid cloud strategyKubernetes with Docker Enterprise for multi and hybrid cloud strategy
Kubernetes with Docker Enterprise for multi and hybrid cloud strategy
 
Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...
Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...
Google Cloud Storage | Google Cloud Platform Tutorial | Google Cloud Architec...
 
Tropos.io - Hadoop in the Cloud - BA4ALL 2016
Tropos.io - Hadoop in the Cloud - BA4ALL 2016Tropos.io - Hadoop in the Cloud - BA4ALL 2016
Tropos.io - Hadoop in the Cloud - BA4ALL 2016
 
A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...
A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...
A Well Architected SaaS - A Holistic Look at Cloud Architecture - Pop-up Loft...
 
Alibaba Cloud Object Storage Service Meetup
Alibaba Cloud Object Storage Service MeetupAlibaba Cloud Object Storage Service Meetup
Alibaba Cloud Object Storage Service Meetup
 
Complex Analytics with NoSQL Data Store in Real Time
Complex Analytics with NoSQL Data Store in Real TimeComplex Analytics with NoSQL Data Store in Real Time
Complex Analytics with NoSQL Data Store in Real Time
 

Similar to Dynamic Database Credentials with HashiCorp Vault

Provision to Production with Terraform Enterprise
Provision to Production with Terraform EnterpriseProvision to Production with Terraform Enterprise
Provision to Production with Terraform EnterpriseAmanda MacLeod
 
Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"
Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"
Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"Amazon Web Services
 
Rein in Your Cloud Costs with Terraform and AWS Lambda
Rein in Your Cloud Costs with Terraform and AWS LambdaRein in Your Cloud Costs with Terraform and AWS Lambda
Rein in Your Cloud Costs with Terraform and AWS LambdaAmanda MacLeod
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Amanda MacLeod
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Amanda MacLeod
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Stenio Ferreira
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC) DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC) Coveros, Inc.
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)Arjun Comar
 
Wrangle 2016: Malware Tracking at Scale
Wrangle 2016: Malware Tracking at ScaleWrangle 2016: Malware Tracking at Scale
Wrangle 2016: Malware Tracking at ScaleWrangleConf
 
Shrinking the container_zurich_july_2018
Shrinking the container_zurich_july_2018Shrinking the container_zurich_july_2018
Shrinking the container_zurich_july_2018Ewan Slater
 
From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...
From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...
From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...Amazon Web Services
 
IBM Watson & PHP, A Practical Demonstration
IBM Watson & PHP, A Practical DemonstrationIBM Watson & PHP, A Practical Demonstration
IBM Watson & PHP, A Practical DemonstrationClark Everetts
 
Emotion recognition in images: from idea to a model in production - Nordic DS...
Emotion recognition in images: from idea to a model in production - Nordic DS...Emotion recognition in images: from idea to a model in production - Nordic DS...
Emotion recognition in images: from idea to a model in production - Nordic DS...Hagay Lupesko
 
Life of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech TalksLife of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech TalksAmazon Web Services
 
The big DAM debate: Open source VS. proprietary software
The big DAM debate: Open source VS. proprietary softwareThe big DAM debate: Open source VS. proprietary software
The big DAM debate: Open source VS. proprietary softwareResourceSpace
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyAll Things Open
 

Similar to Dynamic Database Credentials with HashiCorp Vault (20)

Provision to Production with Terraform Enterprise
Provision to Production with Terraform EnterpriseProvision to Production with Terraform Enterprise
Provision to Production with Terraform Enterprise
 
Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"
Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"
Workshop: Build a Virtual Assistant with Amazon Polly and Amazon Lex - "Pollexy"
 
Rein in Your Cloud Costs with Terraform and AWS Lambda
Rein in Your Cloud Costs with Terraform and AWS LambdaRein in Your Cloud Costs with Terraform and AWS Lambda
Rein in Your Cloud Costs with Terraform and AWS Lambda
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
 
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
Secure and Convenient Workflows: Integrating HashiCorp Vault with Pivotal Clo...
 
Vault Agent and Vault 0.11 features
Vault Agent and Vault 0.11 featuresVault Agent and Vault 0.11 features
Vault Agent and Vault 0.11 features
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC) DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)
 
Wrangle 2016: Malware Tracking at Scale
Wrangle 2016: Malware Tracking at ScaleWrangle 2016: Malware Tracking at Scale
Wrangle 2016: Malware Tracking at Scale
 
DevOps Culture at Amazon
DevOps Culture at AmazonDevOps Culture at Amazon
DevOps Culture at Amazon
 
Shrinking the container_zurich_july_2018
Shrinking the container_zurich_july_2018Shrinking the container_zurich_july_2018
Shrinking the container_zurich_july_2018
 
From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...
From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...
From Idea to Customers: Developing Modern Cloud-Enabled Apps with AWS (MOB201...
 
Webinar-DevOps.pdf
Webinar-DevOps.pdfWebinar-DevOps.pdf
Webinar-DevOps.pdf
 
IBM Watson & PHP, A Practical Demonstration
IBM Watson & PHP, A Practical DemonstrationIBM Watson & PHP, A Practical Demonstration
IBM Watson & PHP, A Practical Demonstration
 
Emotion recognition in images: from idea to a model in production - Nordic DS...
Emotion recognition in images: from idea to a model in production - Nordic DS...Emotion recognition in images: from idea to a model in production - Nordic DS...
Emotion recognition in images: from idea to a model in production - Nordic DS...
 
Life of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech TalksLife of a Code Change to a Tier 1 Service - AWS Online Tech Talks
Life of a Code Change to a Tier 1 Service - AWS Online Tech Talks
 
The big DAM debate: Open source VS. proprietary software
The big DAM debate: Open source VS. proprietary softwareThe big DAM debate: Open source VS. proprietary software
The big DAM debate: Open source VS. proprietary software
 
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care CompanyJourney to Establish an Open Source Policy in a Fortune 20 Health Care Company
Journey to Establish an Open Source Policy in a Fortune 20 Health Care Company
 
Guidelines HTML5 & CSS3 - Atlogys (2018)
Guidelines HTML5 & CSS3 - Atlogys (2018)Guidelines HTML5 & CSS3 - Atlogys (2018)
Guidelines HTML5 & CSS3 - Atlogys (2018)
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Dynamic Database Credentials with HashiCorp Vault

  • 1. Copyright © 2018 HashiCorp Dynamic Database Credentials with HashiCorp Vault
  • 2. Copyright © 2018 HashiCorp • HashiCorp solutions engineer based in Austin, Texas • Learned to type on a manual typewriter • Recovering system administrator • Enjoys building robots and automated things • Likes yoga and making pizzas • Github username: scarolan Sean Carolan - HashiCorp Solutions Engineer 2 Triple Rainbow all the way across the sky…
  • 3. Copyright © 2017 HashiCorp Company overview 3 Mission Key Products Founded 2012 by Mitchell Hashimoto and Armon Dadgar We enable organizations to Provision, Secure, Connect, and Run any infrastructure for any application
  • 4. Copyright © 2018 HashiCorp Penetration Testing 4
  • 5. Copyright © 2018 HashiCorp Zoom… 5
  • 6. Copyright © 2018 HashiCorp …Enhance 6 Username: admin Password: empire123
  • 7. Copyright © 2018 HashiCorp Internet of Things 7
  • 8. Copyright © 2018 HashiCorp Stop Password Abuse 8
  • 9. Copyright © 2018 HashiCorp Types of Password Abuse 9 • Choosing a weak password • Sharing passwords with multiple users • Same password on all the dev servers • Same passwords on dev/QA/prod • Password regurgitated into log file • Same password as you use on your personal accounts • Stored in plain text on disk in a properties file • Stored in someone's source code repository • Stored in the company wiki • Etc.
  • 10. Copyright © 2018 HashiCorp What do the Experts Say? 10
  • 11. Copyright © 2018 HashiCorp A Better Way… 11 HashiCorp Vault
  • 12. Copyright © 2018 HashiCorp Vault Architecture 12
  • 13. Copyright © 2018 HashiCorp Vault Architecture 13
  • 14. Copyright © 2018 HashiCorp Vault Architecture 14
  • 15. Copyright © 2018 HashiCorp Dynamic Database Workflow 15
  • 16. s Copyright © 2018 HashiCorp 16 Live Demo

Editor's Notes

  1. Hi and welcome to the HashiCorp User Group meetup. We'd like to thank both Flux7 and Q2 for hosting us.  In tonight's presentation we'll show you how to use HashiCorp Vault to manage dynamic database credentials.
  2. My name is Sean Carolan and I'm a recovering sysadmin.  Now I'm a solutions engineer, which means I spend a lot of time visiting folks who do the job I used to do, and helping them learn how to use Vault and our other open source tools.
  3. Just a quick background since some are probably more familiar than others with our company, we were founded a little over 4 years ago. What Mitchell and Armon observed as Ops practitioners was that as the world was shifting to cloud infrastructure, there was a real gap in the tools available to Ops professionals to help them provision, secure and run this infrastructure. Each of the cloud providers had their own tooling, but that had 2 obvious challenges: using them would lock your applications into that particular environment (cue Oracle all over again) and it left the natural gap of heterogeneity: how to manage the reality that this just introduced one more technology platform to manage — rather than a replacement it was an ‘and’. To them, the tasks required of the ops practitioner to provision, secure and run this infrastructure were pretty clear — in principle the same as those performed for traditional infrastructure, but with tools more attuned to the challenges of cloud and distributed topologies. That was the genesis for Hashicorp: building a product suite for the practitioner to help them provision, secure and run hybrid cloud application infrastructure without tying themselves to a particular platform or technology. The company is really much better known by its products — and in fact most people are unaware that these are all provided by a single company (it is a branding challenge that we are hard at work on addressing). The most popular of those is Vagrant which was the first product built and has more than 30,000 unique downloads each week. But Terraform, Vault, Consul and Nomad have grown incredibly in usage as well, to the point that between them they now generate more than 35,000 unique downloads per week themselves — a stat which has doubled in the past 6 months. I’d be shocked if one or more of these tools isn’t in use at your company already.
  4. Remember this scene from Star Wars?  How was a simple maintenance droid able to log onto this fully armed and operational battle station and take control of the trash compactor?  We did some research and here's what the post mortem showed (Zoom in on screen behind R2D2).
  5. Remember this scene from Star Wars?  How was a simple maintenance droid able to log onto this fully armed and operational battle station and take control of the trash compactor?  We did some research and here's what the post mortem showed (Zoom in on screen behind R2D2).
  6. As it turns out the Death Star had some serious security flaws.  Why would a security minded organization like the Empire have all these unrestricted maintenance ports all over the place?  Why was the exhaust port of the ship connected to the main reactor? The death star was probably a nightmare to secure. You have rebels disguised as stormtroopers, contractors crawling all over the ship, and an unrealistic deadline to get it built that caused some serious security flaws and shortcuts to happen. This is the empire's equivalent of leaving a sticky note on your monitor with your password on it.
  7. Recently there was a casino who lost their high roller database due to an internet-connected fish tank thermometer. https://thehackernews.com/2018/04/iot-hacking-thermometer.html There are refrigerators on the internet.  Barbie dolls. Some of your infrastructure is in the cloud, some is on prem, and some is hosted platform or SaaS.  There is no longer a 'network perimeter' in the traditional sense of the term. You have to assume that *everywhere* is hostile. The internet is a hostile place.  My wife's wordpress site gets attacked hundreds of times a day by bots, crawling around looking for insecure wordpress sites.  They even harvest keywords from the site and try to use them as your password.
  8. Security is hard. Humans suck at managing passwords. Sticky Note Slide Ever see this?  Why does this happen?  A survey about a decade ago revealed that 70% of people would give up their computer password for a chocolate bar.  Humans just aren't that great at remembering complex passwords. In fact, complexity requirements might actually make things worse.  We end up with passwords that look like this: P455w0rd! Let's be real.  You're not fooling any computer by replacing the letter O with a Zero.  Anyone know how long it takes a modern CPU to crack a password like this one?  Yes, milliseconds. So we've made it harder for humans to remember their passwords, but easy for computers to guess them.  Some users just give up and write the password down on a sticky note. Or copy it into a file. Or save it in their source code...the list goes on. Let's not get all smug about this. Almost every one of us in this room has seen passwords being stored places they shouldn't be. Let's look at some of the other forms of password abuse.
  9. Security is hard. Humans suck at managing passwords. Let's not get all smug about this. Almost every one of us in this room has seen passwords being stored places they shouldn't be. Let's look at some of the other forms of password abuse.
  10. What are some of the ways orgs try to limit access and make things more secure?   * Double moat!  More layers of security around the database.   * Bastion hosts * Put passwords into an "Ark", require them to be checked out * Strong permissions on the file * Etc (all the other stuff SANS recommends) How do most applications store their passwords?  That's right, in a file! On the application server.  Even as recently as 2014 the SANS institute created guidlines most of which were about protecting this file, placing it in a safe directory, etc.  But as soon as that machine is compromised, or the password copied somewhere, or written to a log file...you've lost. Any attacker with legitimate credentials is going to look just like any other application or user.  And you often have no way to tell that you've been compromised! Some of these things go on for months. There's got to be a better way.
  11. What if i told you that you could change your database passwords automatically, every 24 hours, without causing any downtime or disruption to your applications? HashiCorp Vault is a modern, API-driven, cloud friendly secrets broker and management system. Vault can store existing credentials or even dynamically manage credentials for you. Salespeople please plug your ears.  Where are my sales bros. Everything I'm about to show you in this demo, you can do with open source Vault.  Ok you guys can unplug your ears now.
  12. Storage Backend - A storage backend is responsible for durable storage of encrypted data. Backends are not trusted by Vault and are only expected to provide durability. The storage backend is configured when starting the Vault server. Barrier - The barrier is cryptographic steel and concrete around the Vault. All data that flows between Vault and the storage backend passes through the barrier. The barrier ensures that only encrypted data is written out, and that data is verified and decrypted on the way in. Much like a bank vault, the barrier must be "unsealed" before anything inside can be accessed. Secrets Engine - A secrets engine is responsible for managing secrets. Simple secrets engines like the "kv" secrets engine simply return the same secret when queried. Some secrets engines support using policies to dynamically generate a secret each time they are queried. This allows for unique secrets to be used which allows Vault to do fine-grained revocation and policy updates. As an example, a MySQL secrets engine could be configured with a "web" policy. When the "web" secret is read, a new MySQL user/password pair will be generated with a limited set of privileges for the web server. Audit Device - An audit device is responsible for managing audit logs. Every request to Vault and response from Vault goes through the configured audit devices. This provides a simple way to integrate Vault with multiple audit logging destinations of different types. Auth Method - An auth method is used to authenticate users or applications which are connecting to Vault. Once authenticated, the auth method returns the list of applicable policies which should be applied. Vault takes an authenticated user and returns a client token that can be used for future requests. As an example, the userpass auth method uses a username and password to authenticate the user. Alternatively, the github auth method allows users to authenticate via GitHub. Client Token - A client token (aka "Vault Token") is a conceptually similar to a session cookie on a web site. Once a user authenticates, Vault returns a client token which is used for future requests. The token is used by Vault to verify the identity of the client and to enforce the applicable ACL policies. This token is passed via HTTP headers. Secret - A secret is the term for anything returned by Vault which contains confidential or cryptographic material. Not everything returned by Vault is a secret, for example system configuration, status information, or policies are not considered secrets. Secrets always have an associated lease. This means clients cannot assume that the secret contents can be used indefinitely. Vault will revoke a secret at the end of the lease, and an operator may intervene to revoke the secret before the lease is over. This contract between Vault and its clients is critical, as it allows for changes in keys and policies without manual intervention. Server - Vault depends on a long-running instance which operates as a server. The Vault server provides an API which clients interact with and manages the interaction between all the secrets engines, ACL enforcement, and secret lease revocation. Having a server based architecture decouples clients from the security keys and policies, enables centralized audit logging and simplifies administration for operators.
  13. The number of shares and the minimum threshold required can both be specified. Shamir's technique can be disabled, and the master key used directly for unsealing. Once Vault retrieves the encryption key, it is able to decrypt the data in the storage backend, and enters the unsealed state. Once unsealed, Vault loads all of the configured audit devices, auth methods, and secrets engines.
  14. What if i told you that you could change your database passwords automatically, every 24 hours, without causing any downtime or disruption to your applications? HashiCorp Vault is a modern, API-driven, cloud friendly secrets broker and management system. Vault can store existing credentials or even dynamically manage credentials for you. Salespeople please plug your ears.  Where are my sales bros. Everything I'm about to show you in this demo, you can do with open source Vault.  Ok you guys can unplug your ears now.
  15. We seem to be missing a #1! I would say #1 is authentication.