Building secure applications with Vault
How to store and grant access to secret or sensitive information is a difficult problem to solve. It’s often too easy to accidentally introduce security issues along the way. Every organization needs to store private or sensitive information, such as database credentials, cloud provider credentials, API keys, etcetera while keeping it accessible to some individuals or systems.
How do you share this information without opening it up to attack? And if a security breach does occur, how can you see what information was requested by whom and revoke the affected keys? One product that provides answers to these questions and solves these security issues is HashiCorp’s Vault.
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault handles leasing, key revocation, key rolling, and auditing.
Secure your applications and infrastructure to limit the surface area and attack time in the event of a breach.
What better way to learn how to manage your secrets and build secure applications with Vault than from the source? On March 31, HashiCorp’s Seth Vargo will facilitate an engineer-led course in Amsterdam for both Vault administrators and developers. Learn how to operationalize vault and write applications that utilize its secrets.
The first part of the course covers the operational components of Vault including:
- Initializing a Vault
- Understanding secrets and leases
- Mounting and configuring secret backends with Vault
- Configuring and parsing audit backends with Vault
- Deploying Vault in an HA environment
The second part of the course covers techniques for integrating Vault secrets into applications including:
After this training, you will be able to set up Vault, store your secrets and sensitive information, and create applications that use Vault to store secrets.comments powered by Disqus