Ongoing threats of data breaches and cyber attacks remain top of mind for every team responsible for securing cloud workloads and applications, especially with the challenge of managing secrets including passwords, tokens, API keys, certificates, and more. Complexity is especially notable with the adoption of emerging technologies such as containers or microservices architecture.
HashiCorp Vault is an open-source solution for managing secrets at scale in the enterprise. Applied in your cloud security workflow, HashiCorp Vault removes the complexity from key and secret management, and because it’s open source, it can be integrated with any AWS, Azure, or Google Cloud configuration.
Our new course, produced in partnership with HashiCorp, helps cloud architects, developers, system administrators, and DevOps specialists learn how to implement core Vault services in their cloud infrastructure.
Get Started with HashiCorp Vault
One challenge to managing secrets lies in their sheer volume.
Modern systems run by accessing secrets, and it’s easy for secret sprawl to occur across environments and users. Often, companies do not have clearly defined “break-glass” procedures to stop the bleeding once an intrusion is detected. Managing secrets properly across systems—lacing, revocation, key rolling, auditing, and secure storage—is difficult. HashiCorp created Vault to address exactly these challenges, and more.
Our new HashiCorp Vault course will prepare you to implement the service and execute Vault administration tasks.
With this course, you will be able to:
- Work with core components of the Vault architecture
- Manage and maintain secrets in Vault
- Deploy and configure Vault within your environments
- Evaluate and select Vault services
- Implement the Vault Command Line Interface and API
HashiCorp Vault is now available in the Cloud Academy library. To get started with the HashiCorp Vault course, sign in to your Cloud Academy account.
In addition to taking the course, you can also get real-world experience with our Hands-on Lab. Use our new lab to configure Vault to use LDAP authentication. Working directly inside the AWS console, you will work with LDAP identities and groups and learn how to authenticate usernames, passwords, or memberships without duplication, and you will create access policies to seamlessly authorize LDAP users in Vault.
Finally, read our previous post for tips on how to secure secrets inside microservices using HashiCorp Vault.
Docker vs. Virtual Machines: Differences You Should Know
What are the differences between Docker and virtual machines? In this article, we'll compare the differences and provide our insights to help you decide between the two. Before we get started discussing Docker vs. Virtual Machines comparisons, let us first explain the basics. What is ...
DevOps: From Continuous Delivery to Continuous Experimentation
Imagine this scenario. Your team built a continuous delivery pipeline. Team members deploy multiple times a day. Telemetry warns the team about production issues before they become outages. Automated tests ensure known regressions don't enter production. Team velocity is consistent and ...
How Google, HP, and Etsy Succeed with DevOps
DevOps is currently well developed, and there are many examples of companies adopting it to improve their existing practices and explore new frontiers. In this article, we'll take a look at case studies and use cases from Google, HP, and Etsy. These companies are having success with Dev...
How to Accelerate Development in the Cloud
Understanding how to accelerate development in the cloud can prevent typical challenges that developers face in a traditional enterprise. While there are many benefits to switching to a cloud-first model, the most immediate one is accelerated development and testing. The road blocks tha...
DevSecOps: How to Secure DevOps Environments
Security has been a friction point when discussing DevOps. This stems from the assumption that DevOps teams move too fast to handle security concerns. This makes sense if Information Security (InfoSec) is separate from the DevOps value stream, or if development velocity exceeds the band...
Understanding Python Datetime Handling
Communicating dates and times with another person is pretty simple... right? “See you at 6 o’clock on Monday” sounds understandable. But was it a.m. or p.m.? And was your friend in the same time zone as you when you said that? When we need to use and store dates and times on Pytho...
Cloud Academy’s Blog Digest: July 2019
July has been a very exciting month for us at Cloud Academy. On July 10, we officially joined forces with QA, the UK’s largest B2B skills provider (read the announcement). Over the coming weeks, you will see additions from QA’s massive catalog of 500+ certification courses and 1500+ ins...
How to Become a DevOps Engineer
The DevOps Handbook introduces DevOps as a framework for improving the process for converting a business hypothesis into a technology-enabled service that delivers value to the customer. This process is called the value stream. Accelerate finds that applying DevOps principles of flow, f...
Top 20 Open Source Tools for DevOps Success
Open source tools perform a very specific task, and the source code is openly published for use or modification free of charge. I've written about DevOps multiple times on this blog. I reiterate the point that DevOps is not about specific tools. It's a philosophy for building and improv...
DevOps: Scaling Velocity and Increasing Quality
All software teams strive to build better software and ship it faster. That's a competitive edge required to survive in the Age of Software. DevOps is the best methodology to leverage that competitive advantage, ultimately allowing practitioners to accelerate software delivery and raise...
Continuous Deployment: What’s the Point?
Continuous Deployment is the pinnacle of high-performance software development. Continuous deployment teams deploy every commit that passes tests to production, and there's nothing faster than that. Even though you'll see the "CD" term thrown around the internet, continuous deployment a...
DevOps Telemetry: Open Source vs Cloud vs Third Party
The DevOps principle of feedback calls for business, application, and infrastructure telemetry. While telemetry is important for engineers when debugging production issues or setting base operational conditions, it is also important to product owners and business stakeholders because it...