Ongoing threats of data breaches and cyber attacks remain top of mind for every team responsible for securing cloud workloads and applications, especially with the challenge of managing secrets including passwords, tokens, API keys, certificates, and more. Complexity is especially notable with the adoption of emerging technologies such as containers or microservices architecture.
HashiCorp Vault is an open-source solution for managing secrets at scale in the enterprise. Applied in your cloud security workflow, HashiCorp Vault removes the complexity from key and secret management, and because it’s open source, it can be integrated with any AWS, Azure, or Google Cloud configuration.
Our new course, produced in partnership with HashiCorp, helps cloud architects, developers, system administrators, and DevOps specialists learn how to implement core Vault services in their cloud infrastructure.
Get Started with HashiCorp Vault
One challenge to managing secrets lies in their sheer volume.
Modern systems run by accessing secrets, and it’s easy for secret sprawl to occur across environments and users. Often, companies do not have clearly defined “break-glass” procedures to stop the bleeding once an intrusion is detected. Managing secrets properly across systems—lacing, revocation, key rolling, auditing, and secure storage—is difficult. HashiCorp created Vault to address exactly these challenges, and more.
Our new HashiCorp Vault course will prepare you to implement the service and execute Vault administration tasks.
With this course, you will be able to:
- Work with core components of the Vault architecture
- Manage and maintain secrets in Vault
- Deploy and configure Vault within your environments
- Evaluate and select Vault services
- Implement the Vault Command Line Interface and API
HashiCorp Vault is now available in the Cloud Academy library. To get started with the HashiCorp Vault course, sign in to your Cloud Academy account.
In addition to taking the course, you can also get real-world experience with our Hands-on Lab. Use our new lab to configure Vault to use LDAP authentication. Working directly inside the AWS console, you will work with LDAP identities and groups and learn how to authenticate usernames, passwords, or memberships without duplication, and you will create access policies to seamlessly authorize LDAP users in Vault.
Finally, read our previous post for tips on how to secure secrets inside microservices using HashiCorp Vault.
New Content: AWS, Azure, Typescript, Java, Docker, 13 New Labs, and Much More
This month, our Content Team released a whopping 13 new labs in real cloud environments! If you haven't tried out our labs, you might not understand why we think that number is so impressive. Our labs are not “simulated” experiences — they are real cloud environments using accounts on A...
New Content: AZ-500 and AZ-400 Updates, 3 Google Professional Exam Preps, Practical ML Learning Path, C# Programming, and More
This month, our Content Team released tons of new content and labs in real cloud environments. Not only that, but we introduced our very first highly interactive "Office Hours" webinar. This webinar, Acing the AWS Solutions Architect Associate Certification, started with a quick overvie...
DevOps: Why Is It Important to Decouple Deployment From Release?
Deployment and release In enterprise organizations, releases are the final step of a long process that, historically, could take months — or even worse — years. Small companies and startups aren’t immune to this. Minimum viable product (MVP) over MVP and fast iterations could lead to t...
DevOps Principles: My Journey as a Software Engineer
I spent the last month reading The DevOps Handbook, a great book regarding DevOps principles, and how tech organizations evolved and succeeded in applying them.As a software engineer, you may think that DevOps is a bunch of people that deploy your code on production, and who are alw...
Linux and DevOps: The Most Suitable Distribution
Modern Linux and DevOps have much in common from a philosophy perspective. Both are focused on functionality, scalability, as well as on the constant possibility of growth and improvement. While Windows may still be the most widely used operating system, and by extension the most common...
How to Effectively Use Azure DevOps
Azure DevOps is a suite of services that collaborate on software development following DevOps principles. The services in Azure DevOps are:Azure Repos for hosting Git repositories for source control of your code Azure Boards for planning and tracking your work using proven agil...
Docker vs. Virtual Machines: Differences You Should Know
What are the differences between Docker and virtual machines? In this article, we'll compare the differences and provide our insights to help you decide between the two. Before we get started discussing Docker vs. Virtual Machines comparisons, let us first explain the basics. What is ...
DevOps: From Continuous Delivery to Continuous Experimentation
Imagine this scenario. Your team built a continuous delivery pipeline. Team members deploy multiple times a day. Telemetry warns the team about production issues before they become outages. Automated tests ensure known regressions don't enter production. Team velocity is consistent and ...
How Google, HP, and Etsy Succeed with DevOps
DevOps is currently well developed, and there are many examples of companies adopting it to improve their existing practices and explore new frontiers. In this article, we'll take a look at case studies and use cases from Google, HP, and Etsy. These companies are having success with Dev...
How to Accelerate Development in the Cloud
Understanding how to accelerate development in the cloud can prevent typical challenges that developers face in a traditional enterprise. While there are many benefits to switching to a cloud-first model, the most immediate one is accelerated development and testing. The road blocks tha...
DevSecOps: How to Secure DevOps Environments
Security has been a friction point when discussing DevOps. This stems from the assumption that DevOps teams move too fast to handle security concerns. This makes sense if Information Security (InfoSec) is separate from the DevOps value stream, or if development velocity exceeds the band...
Understanding Python Datetime Handling
Communicating dates and times with another person is pretty simple... right?“See you at 6 o’clock on Monday” sounds understandable.But was it a.m. or p.m.? And was your friend in the same time zone as you when you said that? When we need to use and store dates and times on Pytho...