SlideShare a Scribd company logo
Equipe Meetup
Julien Bichon
Community ambassador
@jubichon
+ Talk 1 - Be secret like a ninja
with Vault - Mehdi Laruelle
+ Talk 2 - Retour d'expérience
Consul sur AWS - Stéphane
Teyssier - Stéphane Teyssier
Salim Boulkour
Community ambassador
@oumidou
HashiCorp User Group
+ Depuis 2016 en France
+ Paris - 937 personnes
+ Nice - 160 personnes
+ Toulouse - 151 personnes
+ Lyon - 144 personnes
+ Nantes - 103 personnes
+ On cherche des speakers et des
sponsors
MERCI
Mehdi LARUELLE
@D2SI
Be secret like a ninja with
Vault Hashicorp
D2SI Me
Mehdi LARUELLE
Consultant Cloud &
Automation
@mehdilaruelle
Whoami ?
Github Access
PROGRAMME
1 Contextualization
2 Vault Ops side
4 Steps to become a ninja
3 Vault Dev side
5 What’s next ?
// Contextualization1
Problem ?
Problem ?
Mail Code
Vault ? Terraform ? Why ?
// Vault Ops side2
Architecture
Methods & Engines
● LDAP
● RADIUS
● OKTA
● JWT
● Github
● Approle (pipeline)
● TLS Certificate
● Kubernetes
● JWT
● AliCloud / Azure / AWS
/ GCP
● LDAP
Users
AppAuth methods
Methods & Engines
K/V
● Alicloud
● AWS
● GCP
● GCP KMS
● Azure
Secrets
engines
Static secrets
Dynamic
secrets
Cloud Technology
● Active
Directory
● Consul
● Database
● Nomad
● RabbitMQ
Others
● PKI
● SSH
● TOTP
Encryption as
a Service
Transit
How is it working ? Ops side
1. Push IaC
2. CI/CD
process use
Terraform
Ops
// Vault Dev side3
Approle
How is it working ? Dev side
1. Push code
2. CI/CD
process use
Terraform
Dev Ops
0. Send Role ID
Steps to be a ninja
Find secrets
Put secrets in
Vault
Make secrets
dynamics
Encrypt sensitive
data
// Steps to become a ninja4
Steps to be a ninja
Find secrets
Put secrets in
Vault
Make secrets
dynamics
Encrypt sensitive
data
Demonstration
Steps to be a ninja
Find secrets
Put secrets in
Vault
Make secrets
dynamics
Encrypt sensitive
data
How is it working ?
Demonstration
Steps to be a ninja
Find secrets
Put secrets in
Vault
Make secrets
dynamics
Encrypt sensitive
data
Secret as a Service
1.Ask DB credentials
3.Get credentials
5.Ask to revoke credentials
Demonstration
Steps to be a ninja
Find secrets
Put secrets in
Vault
Make secrets
dynamics
Encrypt sensitive
data
EaaS: Encryption as a Service
Application A Application B
1.Put raw data
2.Get encrypted data
5.Put encrypted data
6.Get decrypted data
Demonstration
// What next ?5
To infinity... and beyond!
Vault
Agent
Consul
service
mesh
envconsul
and / or
consul-
template
Question ?
The last but not least

More Related Content

What's hot

There is no container - Ori Pekelman
There is no container - Ori PekelmanThere is no container - Ori Pekelman
There is no container - Ori Pekelman
Paris Container Day
 
Open shift intro for Philly PUG
Open shift intro for Philly PUGOpen shift intro for Philly PUG
Open shift intro for Philly PUG
Steven Pousty
 
Production FS: Adapt or die - Claudia Beresford & Tiago Scolar
Production FS: Adapt or die - Claudia Beresford & Tiago ScolarProduction FS: Adapt or die - Claudia Beresford & Tiago Scolar
Production FS: Adapt or die - Claudia Beresford & Tiago Scolar
Paris Container Day
 
VCS for Teamwork - GIT Workshop
VCS for Teamwork - GIT WorkshopVCS for Teamwork - GIT Workshop
VCS for Teamwork - GIT Workshop
Anis Ahmad
 
HTTP/3 in curl 2020
HTTP/3 in curl 2020HTTP/3 in curl 2020
HTTP/3 in curl 2020
Daniel Stenberg
 
HTTP/3 in curl
HTTP/3 in curlHTTP/3 in curl
HTTP/3 in curl
Daniel Stenberg
 
meetPHP#8 - PHP startups prototypes
meetPHP#8 - PHP startups prototypesmeetPHP#8 - PHP startups prototypes
meetPHP#8 - PHP startups prototypes
Max Małecki
 
About linux-english
About linux-englishAbout linux-english
About linux-english
Shota Ito
 
Using Containers for Continuous Integration and Continuous Delivery
Using Containers for Continuous Integration and Continuous DeliveryUsing Containers for Continuous Integration and Continuous Delivery
Using Containers for Continuous Integration and Continuous Delivery
Carlos Sanchez
 
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry PiCentral Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Andrew Denner
 
Testing curl for security
Testing curl for securityTesting curl for security
Testing curl for security
Daniel Stenberg
 
Getting started with libcurl
Getting started with libcurlGetting started with libcurl
Getting started with libcurl
Daniel Stenberg
 
HTTP/3 for everyone
HTTP/3 for everyoneHTTP/3 for everyone
HTTP/3 for everyone
Daniel Stenberg
 
Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...
Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...
Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...
Patricia Aas
 
Cloud Foundry V2 | Intermediate Deep Dive
Cloud Foundry V2 | Intermediate Deep DiveCloud Foundry V2 | Intermediate Deep Dive
Cloud Foundry V2 | Intermediate Deep Dive
Kazuto Kusama
 
HTTP/3 is next generation HTTP
HTTP/3 is next generation HTTPHTTP/3 is next generation HTTP
HTTP/3 is next generation HTTP
Daniel Stenberg
 
Linux Security and How Web Browser Sandboxes Really Work (NDC Oslo 2017)
Linux Security  and How Web Browser Sandboxes Really Work (NDC Oslo 2017)Linux Security  and How Web Browser Sandboxes Really Work (NDC Oslo 2017)
Linux Security and How Web Browser Sandboxes Really Work (NDC Oslo 2017)
Patricia Aas
 
Terraform 101: What's infrastructure as code?
Terraform 101: What's infrastructure as code?Terraform 101: What's infrastructure as code?
Terraform 101: What's infrastructure as code?
GDX Wu
 
curl roadmap 2020
curl roadmap 2020curl roadmap 2020
curl roadmap 2020
Daniel Stenberg
 
curl better
curl bettercurl better
curl better
Daniel Stenberg
 

What's hot (20)

There is no container - Ori Pekelman
There is no container - Ori PekelmanThere is no container - Ori Pekelman
There is no container - Ori Pekelman
 
Open shift intro for Philly PUG
Open shift intro for Philly PUGOpen shift intro for Philly PUG
Open shift intro for Philly PUG
 
Production FS: Adapt or die - Claudia Beresford & Tiago Scolar
Production FS: Adapt or die - Claudia Beresford & Tiago ScolarProduction FS: Adapt or die - Claudia Beresford & Tiago Scolar
Production FS: Adapt or die - Claudia Beresford & Tiago Scolar
 
VCS for Teamwork - GIT Workshop
VCS for Teamwork - GIT WorkshopVCS for Teamwork - GIT Workshop
VCS for Teamwork - GIT Workshop
 
HTTP/3 in curl 2020
HTTP/3 in curl 2020HTTP/3 in curl 2020
HTTP/3 in curl 2020
 
HTTP/3 in curl
HTTP/3 in curlHTTP/3 in curl
HTTP/3 in curl
 
meetPHP#8 - PHP startups prototypes
meetPHP#8 - PHP startups prototypesmeetPHP#8 - PHP startups prototypes
meetPHP#8 - PHP startups prototypes
 
About linux-english
About linux-englishAbout linux-english
About linux-english
 
Using Containers for Continuous Integration and Continuous Delivery
Using Containers for Continuous Integration and Continuous DeliveryUsing Containers for Continuous Integration and Continuous Delivery
Using Containers for Continuous Integration and Continuous Delivery
 
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry PiCentral Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
 
Testing curl for security
Testing curl for securityTesting curl for security
Testing curl for security
 
Getting started with libcurl
Getting started with libcurlGetting started with libcurl
Getting started with libcurl
 
HTTP/3 for everyone
HTTP/3 for everyoneHTTP/3 for everyone
HTTP/3 for everyone
 
Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...
Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...
Linux Security and How Web Browser Sandboxes Really Work (Security Researcher...
 
Cloud Foundry V2 | Intermediate Deep Dive
Cloud Foundry V2 | Intermediate Deep DiveCloud Foundry V2 | Intermediate Deep Dive
Cloud Foundry V2 | Intermediate Deep Dive
 
HTTP/3 is next generation HTTP
HTTP/3 is next generation HTTPHTTP/3 is next generation HTTP
HTTP/3 is next generation HTTP
 
Linux Security and How Web Browser Sandboxes Really Work (NDC Oslo 2017)
Linux Security  and How Web Browser Sandboxes Really Work (NDC Oslo 2017)Linux Security  and How Web Browser Sandboxes Really Work (NDC Oslo 2017)
Linux Security and How Web Browser Sandboxes Really Work (NDC Oslo 2017)
 
Terraform 101: What's infrastructure as code?
Terraform 101: What's infrastructure as code?Terraform 101: What's infrastructure as code?
Terraform 101: What's infrastructure as code?
 
curl roadmap 2020
curl roadmap 2020curl roadmap 2020
curl roadmap 2020
 
curl better
curl bettercurl better
curl better
 

Similar to Talk be secret like a ninja with Vault

Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud ServiceLet’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
Chi En (Ashley) Shen
 
London HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vaultLondon HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vault
London HashiCorp User Group
 
DevOps by examples @ devopsheroes 2016
DevOps by examples @ devopsheroes 2016DevOps by examples @ devopsheroes 2016
DevOps by examples @ devopsheroes 2016
Giulio Vian
 
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
EC-Council
 
Understanding Sealed Secrets Presentation
Understanding Sealed Secrets PresentationUnderstanding Sealed Secrets Presentation
Understanding Sealed Secrets Presentation
Knoldus Inc.
 
eSynergy Keiran Sweet - Bringing order to chaos with puppet
eSynergy Keiran Sweet - Bringing order to chaos with puppeteSynergy Keiran Sweet - Bringing order to chaos with puppet
eSynergy Keiran Sweet - Bringing order to chaos with puppet
PatrickCrompton
 
Nodejsvault austin2019
Nodejsvault austin2019Nodejsvault austin2019
Nodejsvault austin2019
Taswar Bhatti
 
OSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think DifferentOSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think Different
NATS
 
Docker Service Registration and Discovery
Docker Service Registration and DiscoveryDocker Service Registration and Discovery
Docker Service Registration and Discovery
m_richardson
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014
Cloudflare
 
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash CourseCrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
eightbit
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
Chris Gates
 
44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves
44CON
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
Olle E Johansson
 
#Morecrypto 1.8 - with introduction to TLS
#Morecrypto 1.8 - with introduction to TLS#Morecrypto 1.8 - with introduction to TLS
#Morecrypto 1.8 - with introduction to TLS
Olle E Johansson
 
Wahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash CourseWahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash Course
eightbit
 
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
CloudOps2005
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
UTD Computer Security Group
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for Pentesting
Mike Felch
 
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Rackspace Academy
 

Similar to Talk be secret like a ninja with Vault (20)

Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud ServiceLet’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
 
London HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vaultLondon HUG 19/5 - Kubernetes and vault
London HUG 19/5 - Kubernetes and vault
 
DevOps by examples @ devopsheroes 2016
DevOps by examples @ devopsheroes 2016DevOps by examples @ devopsheroes 2016
DevOps by examples @ devopsheroes 2016
 
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specific...
 
Understanding Sealed Secrets Presentation
Understanding Sealed Secrets PresentationUnderstanding Sealed Secrets Presentation
Understanding Sealed Secrets Presentation
 
eSynergy Keiran Sweet - Bringing order to chaos with puppet
eSynergy Keiran Sweet - Bringing order to chaos with puppeteSynergy Keiran Sweet - Bringing order to chaos with puppet
eSynergy Keiran Sweet - Bringing order to chaos with puppet
 
Nodejsvault austin2019
Nodejsvault austin2019Nodejsvault austin2019
Nodejsvault austin2019
 
OSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think DifferentOSCON 2019 | Time to Think Different
OSCON 2019 | Time to Think Different
 
Docker Service Registration and Discovery
Docker Service Registration and DiscoveryDocker Service Registration and Discovery
Docker Service Registration and Discovery
 
Sullivan red october-oscon-2014
Sullivan red october-oscon-2014Sullivan red october-oscon-2014
Sullivan red october-oscon-2014
 
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash CourseCrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
 
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINEPENETRATION TESTING FROM A HOT TUB TIME MACHINE
PENETRATION TESTING FROM A HOT TUB TIME MACHINE
 
44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves44CON 2014 - Meterpreter Internals, OJ Reeves
44CON 2014 - Meterpreter Internals, OJ Reeves
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
 
#Morecrypto 1.8 - with introduction to TLS
#Morecrypto 1.8 - with introduction to TLS#Morecrypto 1.8 - with introduction to TLS
#Morecrypto 1.8 - with introduction to TLS
 
Wahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash CourseWahckon[2] - iOS Runtime Hacking Crash Course
Wahckon[2] - iOS Runtime Hacking Crash Course
 
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
Defense in Depth: Securing your new Kubernetes cluster from the challenges th...
 
Introduction to Exploitation
Introduction to ExploitationIntroduction to Exploitation
Introduction to Exploitation
 
Offensive Python for Pentesting
Offensive Python for PentestingOffensive Python for Pentesting
Offensive Python for Pentesting
 
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
Unlocked: the Hybrid Cloud - 12th May 2014 / All Slides (morning)
 

More from Devoteam Revolve

Formations AWS - Catalogue D2SI Authorized Training Partner
Formations AWS - Catalogue D2SI Authorized Training PartnerFormations AWS - Catalogue D2SI Authorized Training Partner
Formations AWS - Catalogue D2SI Authorized Training Partner
Devoteam Revolve
 
Meetup Sécurité - AWS - Boundary Policy
Meetup Sécurité - AWS - Boundary PolicyMeetup Sécurité - AWS - Boundary Policy
Meetup Sécurité - AWS - Boundary Policy
Devoteam Revolve
 
Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019
Devoteam Revolve
 
Meetup Sobriété numérique
Meetup Sobriété numériqueMeetup Sobriété numérique
Meetup Sobriété numérique
Devoteam Revolve
 
La DSI plateforme : DevOps, Agilité et Cloud
La DSI plateforme : DevOps, Agilité et CloudLa DSI plateforme : DevOps, Agilité et Cloud
La DSI plateforme : DevOps, Agilité et Cloud
Devoteam Revolve
 
Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...
Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...
Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...
Devoteam Revolve
 
Scaling @Bouygues Telecom AWS Paris 2019
Scaling @Bouygues Telecom AWS Paris 2019Scaling @Bouygues Telecom AWS Paris 2019
Scaling @Bouygues Telecom AWS Paris 2019
Devoteam Revolve
 
Entreprise Plateforme - Le nouveau modèle ?
Entreprise Plateforme - Le nouveau modèle ? Entreprise Plateforme - Le nouveau modèle ?
Entreprise Plateforme - Le nouveau modèle ?
Devoteam Revolve
 
A way to share secrets in your pipeline - Hashidays 2018
A way to share secrets in your pipeline - Hashidays 2018A way to share secrets in your pipeline - Hashidays 2018
A way to share secrets in your pipeline - Hashidays 2018
Devoteam Revolve
 
Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018
Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018
Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018
Devoteam Revolve
 
Automation of Active Directory's Deployments on AWS
Automation of Active Directory's Deployments on AWSAutomation of Active Directory's Deployments on AWS
Automation of Active Directory's Deployments on AWS
Devoteam Revolve
 
AWS Summit Paris 2017 : DevOps in a container world
AWS Summit Paris 2017 : DevOps in a container worldAWS Summit Paris 2017 : DevOps in a container world
AWS Summit Paris 2017 : DevOps in a container world
Devoteam Revolve
 
AWS Summit Paris 2017 : AWS loves Microsoft Workloads
AWS Summit Paris 2017 : AWS loves Microsoft WorkloadsAWS Summit Paris 2017 : AWS loves Microsoft Workloads
AWS Summit Paris 2017 : AWS loves Microsoft Workloads
Devoteam Revolve
 
AWS Summit Paris 2017 : Gameday Veolia
AWS Summit Paris 2017 : Gameday VeoliaAWS Summit Paris 2017 : Gameday Veolia
AWS Summit Paris 2017 : Gameday Veolia
Devoteam Revolve
 
Meetup Responsive Org #1
Meetup Responsive Org #1Meetup Responsive Org #1
Meetup Responsive Org #1
Devoteam Revolve
 
Continuous integration of_puppet_code
Continuous integration of_puppet_codeContinuous integration of_puppet_code
Continuous integration of_puppet_code
Devoteam Revolve
 
Réunion de triage en holacratie v2
Réunion de triage en holacratie v2Réunion de triage en holacratie v2
Réunion de triage en holacratie v2
Devoteam Revolve
 
[Oldies] Club client D2SI : DevOps
[Oldies] Club client D2SI : DevOps [Oldies] Club client D2SI : DevOps
[Oldies] Club client D2SI : DevOps
Devoteam Revolve
 
Présentation D2SI AWS Summit Paris 2014
Présentation D2SI AWS Summit Paris 2014Présentation D2SI AWS Summit Paris 2014
Présentation D2SI AWS Summit Paris 2014
Devoteam Revolve
 
Achieving Continuous Delivery with Puppet
Achieving Continuous Delivery with PuppetAchieving Continuous Delivery with Puppet
Achieving Continuous Delivery with Puppet
Devoteam Revolve
 

More from Devoteam Revolve (20)

Formations AWS - Catalogue D2SI Authorized Training Partner
Formations AWS - Catalogue D2SI Authorized Training PartnerFormations AWS - Catalogue D2SI Authorized Training Partner
Formations AWS - Catalogue D2SI Authorized Training Partner
 
Meetup Sécurité - AWS - Boundary Policy
Meetup Sécurité - AWS - Boundary PolicyMeetup Sécurité - AWS - Boundary Policy
Meetup Sécurité - AWS - Boundary Policy
 
Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019
 
Meetup Sobriété numérique
Meetup Sobriété numériqueMeetup Sobriété numérique
Meetup Sobriété numérique
 
La DSI plateforme : DevOps, Agilité et Cloud
La DSI plateforme : DevOps, Agilité et CloudLa DSI plateforme : DevOps, Agilité et Cloud
La DSI plateforme : DevOps, Agilité et Cloud
 
Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...
Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...
Sécurité via l'automatisation : DevOps pour InfoSec. chez Renault Digital - A...
 
Scaling @Bouygues Telecom AWS Paris 2019
Scaling @Bouygues Telecom AWS Paris 2019Scaling @Bouygues Telecom AWS Paris 2019
Scaling @Bouygues Telecom AWS Paris 2019
 
Entreprise Plateforme - Le nouveau modèle ?
Entreprise Plateforme - Le nouveau modèle ? Entreprise Plateforme - Le nouveau modèle ?
Entreprise Plateforme - Le nouveau modèle ?
 
A way to share secrets in your pipeline - Hashidays 2018
A way to share secrets in your pipeline - Hashidays 2018A way to share secrets in your pipeline - Hashidays 2018
A way to share secrets in your pipeline - Hashidays 2018
 
Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018
Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018
Transformation Cloud & DevOps chez Renault Digital - AWS Summit Paris 2018
 
Automation of Active Directory's Deployments on AWS
Automation of Active Directory's Deployments on AWSAutomation of Active Directory's Deployments on AWS
Automation of Active Directory's Deployments on AWS
 
AWS Summit Paris 2017 : DevOps in a container world
AWS Summit Paris 2017 : DevOps in a container worldAWS Summit Paris 2017 : DevOps in a container world
AWS Summit Paris 2017 : DevOps in a container world
 
AWS Summit Paris 2017 : AWS loves Microsoft Workloads
AWS Summit Paris 2017 : AWS loves Microsoft WorkloadsAWS Summit Paris 2017 : AWS loves Microsoft Workloads
AWS Summit Paris 2017 : AWS loves Microsoft Workloads
 
AWS Summit Paris 2017 : Gameday Veolia
AWS Summit Paris 2017 : Gameday VeoliaAWS Summit Paris 2017 : Gameday Veolia
AWS Summit Paris 2017 : Gameday Veolia
 
Meetup Responsive Org #1
Meetup Responsive Org #1Meetup Responsive Org #1
Meetup Responsive Org #1
 
Continuous integration of_puppet_code
Continuous integration of_puppet_codeContinuous integration of_puppet_code
Continuous integration of_puppet_code
 
Réunion de triage en holacratie v2
Réunion de triage en holacratie v2Réunion de triage en holacratie v2
Réunion de triage en holacratie v2
 
[Oldies] Club client D2SI : DevOps
[Oldies] Club client D2SI : DevOps [Oldies] Club client D2SI : DevOps
[Oldies] Club client D2SI : DevOps
 
Présentation D2SI AWS Summit Paris 2014
Présentation D2SI AWS Summit Paris 2014Présentation D2SI AWS Summit Paris 2014
Présentation D2SI AWS Summit Paris 2014
 
Achieving Continuous Delivery with Puppet
Achieving Continuous Delivery with PuppetAchieving Continuous Delivery with Puppet
Achieving Continuous Delivery with Puppet
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Talk be secret like a ninja with Vault

Editor's Notes

  1. Les point à développer pour présenter D2SI : Pure player CLoud Partenaire premier AWS - Authorized Training Partner AWS - +300 certifications AWS. Partenaire Google, plusieurs formateurs certifiés GCP Spécialiste du DevOps, Infra as Code, DevSecOps, Serverless.
  2. Decrire plus + un example par group
  3. Challenge for two app to store encrypted data in DB
  4. >> Nicolas