SECRET MANAGEMENT
1
Sensitive data & Secrets problem
2
Vault – why ?
● Need of centralization of source of truth (for secret)
● Data encryption (not plain text)
● Tracking of credentials access by audit log
● leases/revoke mechanism for credentials
3
4
• Platform for securely managing
sensitive data with strong encryption
• Controls access to secrets by
authenticating against source of identity
(LDAP, Kubernetes, AWS, GCP,…)
• Policy & token for client accessibly
Vault – what ?
5
Vault – how ?
6
Vault – how ?
Vault – survival guide for dev (1/2)
7
1. Volumes (for Vault)
- secret for dedicated ServiceAccount
- mountVolume for credentials get from Vault server
2. Dedicated ServiceAccount
(vault-auth-<svc_name>) – use to authenticate with Vault
server
3. New Parameters at application’s values.yaml:
- vaultServer
8
Vault – survival guide for dev (1/2)
Vault – Demo !!!
9
SHOW UP TIME
Vault – Demo !!!
10
Questions & Answers

Vault - Enhancement for K8S secret security

  • 1.
  • 2.
    Sensitive data &Secrets problem 2
  • 3.
    Vault – why? ● Need of centralization of source of truth (for secret) ● Data encryption (not plain text) ● Tracking of credentials access by audit log ● leases/revoke mechanism for credentials 3
  • 4.
    4 • Platform forsecurely managing sensitive data with strong encryption • Controls access to secrets by authenticating against source of identity (LDAP, Kubernetes, AWS, GCP,…) • Policy & token for client accessibly Vault – what ?
  • 5.
  • 6.
  • 7.
    Vault – survivalguide for dev (1/2) 7 1. Volumes (for Vault) - secret for dedicated ServiceAccount - mountVolume for credentials get from Vault server 2. Dedicated ServiceAccount (vault-auth-<svc_name>) – use to authenticate with Vault server 3. New Parameters at application’s values.yaml: - vaultServer
  • 8.
    8 Vault – survivalguide for dev (1/2)
  • 9.
    Vault – Demo!!! 9 SHOW UP TIME
  • 10.
    Vault – Demo!!! 10 Questions & Answers