This document summarizes a presentation given by the New York Times' Delivery Engineering Team about how they adopted and manage Hashicorp Vault at the New York Times. Some key points: - They were having problems managing secrets before and Vault helped simplify this. - They leverage Vault's authentication methods, ACLs, auditing, and "break glass" capabilities. - To better isolate access, they created namespaces in Vault for teams and integrated this with Terraform and a tool called Goblin. - They also integrated Vault with their Google Kubernetes Engine cluster by having init containers fetch signed JWTs and write secrets to shared memory volumes. - This approach removes secrets