ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Vault Associate Certification Internals
Vault Associate Certification Internals
Vault Associate Certification Internals
OVERVIEW
THESE NOTES FOLLOW HASHICORP SPECIFIC STRUCTURE
FOUND HERE s HTTP www.VAVLTPROJECT.IO Docs INTERNALS
SECURITY OVERVIEW ARCHITECTURE
PROPERTIES
FUNCTIONS
WHAT IS VAULT
eggs
EffFE
sAEEffffs TIGHTSECURITY CONTROLS
AUDIT
LOGS
L v s
API
keys
PASSWORDS CERTS
FEATURES
SECURE 1
SECRET SECRET ENCRYPTION STORAGE
STORAGE
PROVIDETEMPACCESS
to
APP
2
DYNAMIC 4
SECRETS r 3
I I NEED
v
ACCESS
GENERATE
ENCRYPT
ENCRYPT AND
DATA
ENCRYPTION i DATA DECRYPT WITHOUT
DECRYPT STORINGINVAULT
LEASING AND a REVOCATION
SECRETRENEWAL
ALLSECRETSHAVE
Ability toRevokeLEASEASSOCIATED
entiretree of secrets
ARCHITECTURE
HTTPS IAPI
TOKENSTORE POLICYSTORE AUDIT
CORE
ROLLBACKMGR EXPIRATIONMGR BROKER
d AUDITw
PATH ROUTING DEVICE
A SYSTEM SECRET AUTH AUDIT
BACKEND ENGINE METHOD DEVICE
STORAGEBACKEND
0 HTTPS API EXTERNALFACING
t
BARRIER Vault Startsin Sealed state
1 MustUnseal
Mustbe How
Unsealed V Unsealkeys
Alldata to
Howsthrough SHAMIR'SSECRETSHARING Algorithm
cryptographic barrier
seal
SHAMIRS SECRET SHARING ALGORITHM
ENCRYPTION
MASTER
KEY
KEY
SHARES
s
I 2
ABLETO
DECRYPT
DATA
L ENTERUIVSEALED
STORAGE
STATE
BACKEND
UNSEALED
Loads all audit devices
Auth methods
VAULT
Secrets Engines
ONCEUNSEALED
REQUESTSCANBE Managethe flow of requestsPROCESSEDBYTHE
CORE CORE Enforce ACLs
Audit logging
I 1 Authentication
O
CORE MA
f D
2 RETURN LIST OF POLICIES Named ACLS
VAULT OPERATES EXCLUSIVELY
IN WHITELIST MODE
Access must be explicitly granted
2 O o or
my TOKEN STORE
HERE AREMY
1 CLIENTTOKENGENERATED
f
POLICIES j
ATTACH LEASE
0 I
f
REQUEST SECRET CORE 2
SECRET ENGINE IIFiiiIIII
N r
CLIENT TOKEN I'MTelling
4 i.e Returning Secret
EXPIRATION
MANAGER
3 Attaching lease ID
HIGH AVAILABILITY
DESIGN MINIMISE DOWNTIME
GOAL NOT
TO BE140120NTALLY SCALABLE
BOUND13410 NOT CPU
HA MODE STATE
EITHER
L J IF aSEALED
STANDBY 7 ACTIVE FAILS
NETWORKCONNECTIVITY
SEND THEN
X PROCESSREQUESTS HERE v
SEND TO STANDBY
MUST BEUNSEALED
PERFORMANCE is
SIMILAR TO STANDBY BUT
STANDBY
CAN SERVICEREADONLY REQUESTS
NODES
SCALE
NODES
I 2 3 4 5 V
SCALE IOPS HORIZONTALLY
INTEGRATED STORAGE
VAULT INTEGRATED STORAGE
t l
t l
t l
v s
17A REPLICATION BACKUPAND
RESTORE
WORKFLOWS
RAFT CONSENSUS PROTOCOL
BASED ONPAXOS BUTSIMPLER
CANSOMEONE EeiiEIIIIII
VOTEFORME
tfIfD Ok
PEERNODE
NODE
START
CANDIDATE
STATE
I WILLPROMOTE
MYSELF
te Np LEADERGREAT
I CANACCEPT FOLLOWER IDEA STATE
LOG ENTRIES STATE
FROM A LEADER ICANACCEPTNEW
GENTRIES
AND
I CAN VOTE REPLICATE TO
ALLTHEOTHER
FOLLOWERS
NO ENTRIES FOR AWHILE
RAFT CONSENSUS PROTOCOL CONTINUED
LEADER
CLIENT REQUEST 1
APPEND A NEW LOG ENTRY
2
REPLICATE
TO STORAGE
FOLLOWERS
3QUORUM
COMMITTED
GO KEY VALUE Collection offinite
STORE Stateswithtrasitions
FINITE
betweenthemAsnew
STATE logsare appliedFSMis
MACHINE allowedtotransitionbetween
BOLTDB StatesApplicationoflogs
Mustresultinthesamestate
Deterministic
This is the FSM
AllowsVault whichmaintains
snapshots to be cluster state
very lightweight
RECOMMENDED
I 2 3 4 5
3 or 5 NODES
DUE TOQUORUM
CONFIDENTIALITY
SECURITY MODEL INTEGRITY
AVAILABILITY
ACCOUNTABILITY
AUTHENTICATION
EAVESDROPPING
CONFIDENTIALITY OF
STORED SECRETS
9
TAMPERING
WITHDATA HREAT MODEL
ACCESSTO DATA CONTROLS
WITHOUT ACCOUNTABILITY
ACCESSTODATA v
WITHOUT AUTH AVAILABILITY OFDATA
IN THE FACE OF FAILURE
VAULTVALIDATES
CLIENTTOKENAND a 2MAN RULEFOR
NOTEXPIREDREVOKED UNSEALUSING
INTERNAL SHAMIRSECRETSHARING
DEFAULT a
THREAT MUST BE ROOT FOR
DENY SPECIFICTASKS
EXTERNAL 256 BIT AES IN
TL5t Gcm WITH 96 BIT
TOKEN THREAT noncesFORALLDATA
LEAVINGVAULT
J
CLIENT UNTRUSTED BY STORAGE
DESIGN BACKEND
ENCRYPTED
TELEMETRY
TELEMETRY VAULT SERVERCOLLECTS
VARIOUS RUNTIMEMETRICS
I
VIEW RAW DATA PERFORMANCE OF DIFFERENT
7 WIN BREAK LIBRARIESANDSUBSYSTEMS
SENDSIGNALTO
VAULT PROCESS LINUX 05121
v
AGGREGATED AT RETAINED FOR
10SECONDINTERVALS 1 MINUTE
AUTH METHODS
r
MERKLETREE AND REPLICATION
WRITEAHEAD LOG
POLICY AND
TOKEN
METRICS
AUDIT
INTEGRATED SECRET ENGINE
RAFT in
STORAGE CORE
LEADERSHIPCHANGES RUNTIME
I
INTEGRATED STORAGE
RAFT BACKEND
STORAGE
TOKEN AUTHENTICATION
TOKEN
CORECLIENTAUTH
AUTH 7 BUILT IN
TOKEN
ID Primary ID Randomly Generated
Display Name
Properties
Meta data for auditlogging
Immutable Number of Uses Optional
Once
Created ParentID Optional Parent created token
Policies associated list of ACL policies
SourcePath Path generated
TOKENCREATED auth token create
I
Parent Toker
TOKEN
TREES Child tokens from
subset of parent policies
Tokenrevoked entire subtree revoked
KEY ROTATION
START VAULT SEALED STATE
UNSEAL 5 KEYS SHAMIR'SSECRET
KEY ROTATION
CHANGE UNSEAL KEYS
MASTERKEY
BACKENDENCRYPTION KEY
OPERATION ROTATE CHANGE ENCRYPTION KEY
7
v
u CANBEDONE NEW KEYGENERATEDAND
REILEY c ONLINE
ADDED TO KEYRING
MEETTHRESHOLD
GENERATE s OFCURRENTUNSEAL
MASTERKEY KEYS
REPLICATION VAULT ENTERPRISE
FOCUS ON HAFOR a REPLICATION PRIMARY SECONDARYG N
GLOBALDEPLOYMENTS ASYNCHRONOUS REPLICATION
SCALETHROUGHPUT USE CASES MULTI DCDEPLOYMENTS
SINGLEVAULTCLUSTER
IMPOSESHIGHLATENCY
ENCRYPTIONASSERVICE v
USERSMAYGENERATE Backup sites
HIGHVOLUMEOFTRAFFIC
BCPFORLOSSOFDC
SIMPLE To
DESIGN GOALS AVAILABILITY
OPERATE TOLERATEREDUCED
CONSISTENCY
NEARREALTIME
CONFLICT TRANSPARENTTO
FREE CLIENTS
1
WRITECONFLICTS
DO NOTTAKEPLACE
REPLICATION ARCHITECTURE
BASED ONDESIGN GOALS TEBACKEND CONSUL
y
STORAC
THATSUPPORTSTRANSACTIONAL
UPDATES
MULTIPLE KEYHALVEUPDATES
ATOMICALLY
WRITESAREVISIBLE REPLICATION
I 4
CLUSTER MAINTAIN A
LOGSHIPPING WRITE AHEAD LOG WAL
L S
OFALLUPDATES
REPLICATE PRIMARY SECONDARY
CHANGES f t
AUTHORITATIVE READSECRETS PERFORM
1 SENDDATATHROUGH TRANSIT LOG
WRITETOSTORAGE FORWARDWRITES TO PRIMARY SHIPPING
1 I 1
IF SECONDARY15
MODIFYPOLICY MODIFYSECRETS NEWORTOOFAR
BEHINDprimary
1NOTENOUGHWALS
BROKENCONNECTION
SOURCE 1
PRIMARY X SECONDARY
op
VAULTMAINTAINS
TRUTH MERKLEINDEX
OFENCRYPTED
WRITESCONTINUE
FEETYED KEYS
r
STAYLOCAL NOREPLICATION
TOKENSORLEASES PRIMARY COMPARETO
SECONDARY
VENTMUST WHICHKEYS UT
AUTHIFSWITCH OFSYNC
OSTERS
PERFORMANCE
I
INDEXUPDATED IN COULD BEPOWER
MEMORY Loss
?
CONSISTENCY OF INDEX6000TOF
INDEX UNDER T SYNC
FAIL CONDITION
ARIES
ALGORITHM
PLUGIN SYSTEM
COMMUNICATES OVER RPC
COMPLETELY SEPERATE
STANDALONE APPLICATIONS
ALL AUTH
AND SECRET PLUGINSBACKENDS
DOES NOT SHARE SAME MEMORY SPACE
TREATBUILTIN
ANDEXTERNAL
PLUGINLIKE
PLUGIN CAN NOT CRASH VAULT ENTIRELYLEGO

More Related Content

Similar to Vault Associate Certification Internals (20)

Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Peter Souter
?
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
Ulf Mattsson
?
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
muthulx
?
CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...
CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...
CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...
TI Safe
?
Resilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security modelsResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models
Milosch Meriac
?
ϵ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²
ϵ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²Ïµ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²
ϵ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²
Galaxy Software Services
?
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
Sanjeev Kumar Jaiswal
?
MITRE-Module 4 ºÝºÝߣs.pdf
MITRE-Module 4 ºÝºÝߣs.pdfMITRE-Module 4 ºÝºÝߣs.pdf
MITRE-Module 4 ºÝºÝߣs.pdf
ReZa AdineH
?
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
?tefan Popa
?
Designing Secure APIs
Designing Secure APIsDesigning Secure APIs
Designing Secure APIs
Steven Chen
?
Qark DefCon 23
Qark DefCon 23Qark DefCon 23
Qark DefCon 23
?Tony Trummer?
?
Architecture vulnerabilities in?SAP?platforms
Architecture vulnerabilities in?SAP?platformsArchitecture vulnerabilities in?SAP?platforms
Architecture vulnerabilities in?SAP?platforms
ERPScan
?
PPT 1.pptx
PPT 1.pptxPPT 1.pptx
PPT 1.pptx
Ivar35
?
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
?
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Tim Mackey
?
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Black Duck by Synopsys
?
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
Lilminow
?
Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017
Big Data Spain
?
Data Encryption at Rest
Data Encryption at RestData Encryption at Rest
Data Encryption at Rest
All Things Open
?
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
?
Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Peter Souter
?
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
Ulf Mattsson
?
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
muthulx
?
CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...
CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...
CLASS 2022 - Felipe Jord?o (Palo Alto Networks) - Boas pr¨¢ticas de opera??es ...
TI Safe
?
Resilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security modelsResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models
Milosch Meriac
?
ϵ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²
ϵ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²Ïµ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²
ϵ½y02_êPæIµÄ¡¸ÌØ™à+ÙYÁÏ°²È«¡¹×îááÒ»Á¨·À¾€ ½âÖÒº²
Galaxy Software Services
?
MITRE-Module 4 ºÝºÝߣs.pdf
MITRE-Module 4 ºÝºÝߣs.pdfMITRE-Module 4 ºÝºÝߣs.pdf
MITRE-Module 4 ºÝºÝߣs.pdf
ReZa AdineH
?
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
?tefan Popa
?
Designing Secure APIs
Designing Secure APIsDesigning Secure APIs
Designing Secure APIs
Steven Chen
?
Architecture vulnerabilities in?SAP?platforms
Architecture vulnerabilities in?SAP?platformsArchitecture vulnerabilities in?SAP?platforms
Architecture vulnerabilities in?SAP?platforms
ERPScan
?
PPT 1.pptx
PPT 1.pptxPPT 1.pptx
PPT 1.pptx
Ivar35
?
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
?
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Tim Mackey
?
Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...Using hypervisor and container technology to increase datacenter security pos...
Using hypervisor and container technology to increase datacenter security pos...
Black Duck by Synopsys
?
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
Lilminow
?
Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos G¨®mez at Big Data Spain 2017
Big Data Spain
?
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
?

Recently uploaded (20)

The nature of technolog and Computer networks.pptx
The nature of technolog and Computer networks.pptxThe nature of technolog and Computer networks.pptx
The nature of technolog and Computer networks.pptx
vallidevi6
?
CSUN 2025 - Interactive Charts for Everyone.pptx
CSUN 2025 - Interactive Charts for Everyone.pptxCSUN 2025 - Interactive Charts for Everyone.pptx
CSUN 2025 - Interactive Charts for Everyone.pptx
?ystein Moseng
?
Software-Engineering-and-Best-Practices.
Software-Engineering-and-Best-Practices.Software-Engineering-and-Best-Practices.
Software-Engineering-and-Best-Practices.
oziasrondonc
?
AI Agents, such as Autogen at Tide Sprint
AI Agents, such as Autogen at Tide SprintAI Agents, such as Autogen at Tide Sprint
AI Agents, such as Autogen at Tide Sprint
Nathan Bijnens
?
"Constructive Interaction During Emotional Burnout: With Local and Internatio...
"Constructive Interaction During Emotional Burnout: With Local and Internatio..."Constructive Interaction During Emotional Burnout: With Local and Internatio...
"Constructive Interaction During Emotional Burnout: With Local and Internatio...
Fwdays
?
UiPath Automation Developer Associate Training Series 2025 - Session 6
UiPath Automation Developer Associate Training Series 2025 - Session 6UiPath Automation Developer Associate Training Series 2025 - Session 6
UiPath Automation Developer Associate Training Series 2025 - Session 6
DianaGray10
?
Blending AI in Enterprise Architecture.pdf
Blending AI in Enterprise Architecture.pdfBlending AI in Enterprise Architecture.pdf
Blending AI in Enterprise Architecture.pdf
Calvin Hendryx-Parker
?
Salesforce Welly March 2025User Group Meeting
Salesforce Welly March 2025User Group MeetingSalesforce Welly March 2025User Group Meeting
Salesforce Welly March 2025User Group Meeting
Anna Loughnan Colquhoun
?
Large Language Models vs Small Language Models
Large Language Models vs Small Language ModelsLarge Language Models vs Small Language Models
Large Language Models vs Small Language Models
Nathan Bijnens
?
[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...
[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...
[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...
Fwdays
?
WSO2Con 2025 - Architecting Cloud-Native Applications
WSO2Con 2025 - Architecting Cloud-Native ApplicationsWSO2Con 2025 - Architecting Cloud-Native Applications
WSO2Con 2025 - Architecting Cloud-Native Applications
WSO2
?
Columbia Weather Systems - Product Overview
Columbia Weather Systems - Product OverviewColumbia Weather Systems - Product Overview
Columbia Weather Systems - Product Overview
Columbia Weather Systems
?
Slack Social Meetup Connect, Collaborate & Grow!.pptx
Slack Social Meetup Connect, Collaborate & Grow!.pptxSlack Social Meetup Connect, Collaborate & Grow!.pptx
Slack Social Meetup Connect, Collaborate & Grow!.pptx
SanjeetMishra29
?
"Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest...
"Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest..."Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest...
"Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest...
Fwdays
?
Think Like and Architect Series: Session 1 of 9 Declarative Design
Think Like and Architect Series: Session 1 of 9 Declarative DesignThink Like and Architect Series: Session 1 of 9 Declarative Design
Think Like and Architect Series: Session 1 of 9 Declarative Design
Walter Spinrad
?
UiPath Automation Developer Associate Training Series 2025 - Session 5
UiPath Automation Developer Associate Training Series 2025 - Session 5UiPath Automation Developer Associate Training Series 2025 - Session 5
UiPath Automation Developer Associate Training Series 2025 - Session 5
DianaGray10
?
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on CodeWSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2
?
"AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea...
"AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea..."AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea...
"AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea...
Fwdays
?
Diving into LTI: From the basics to Deep Linking
Diving into LTI: From the basics to Deep LinkingDiving into LTI: From the basics to Deep Linking
Diving into LTI: From the basics to Deep Linking
Rustici Software
?
Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...
Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...
Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...
Gregor Lyttek
?
The nature of technolog and Computer networks.pptx
The nature of technolog and Computer networks.pptxThe nature of technolog and Computer networks.pptx
The nature of technolog and Computer networks.pptx
vallidevi6
?
CSUN 2025 - Interactive Charts for Everyone.pptx
CSUN 2025 - Interactive Charts for Everyone.pptxCSUN 2025 - Interactive Charts for Everyone.pptx
CSUN 2025 - Interactive Charts for Everyone.pptx
?ystein Moseng
?
Software-Engineering-and-Best-Practices.
Software-Engineering-and-Best-Practices.Software-Engineering-and-Best-Practices.
Software-Engineering-and-Best-Practices.
oziasrondonc
?
AI Agents, such as Autogen at Tide Sprint
AI Agents, such as Autogen at Tide SprintAI Agents, such as Autogen at Tide Sprint
AI Agents, such as Autogen at Tide Sprint
Nathan Bijnens
?
"Constructive Interaction During Emotional Burnout: With Local and Internatio...
"Constructive Interaction During Emotional Burnout: With Local and Internatio..."Constructive Interaction During Emotional Burnout: With Local and Internatio...
"Constructive Interaction During Emotional Burnout: With Local and Internatio...
Fwdays
?
UiPath Automation Developer Associate Training Series 2025 - Session 6
UiPath Automation Developer Associate Training Series 2025 - Session 6UiPath Automation Developer Associate Training Series 2025 - Session 6
UiPath Automation Developer Associate Training Series 2025 - Session 6
DianaGray10
?
Blending AI in Enterprise Architecture.pdf
Blending AI in Enterprise Architecture.pdfBlending AI in Enterprise Architecture.pdf
Blending AI in Enterprise Architecture.pdf
Calvin Hendryx-Parker
?
Salesforce Welly March 2025User Group Meeting
Salesforce Welly March 2025User Group MeetingSalesforce Welly March 2025User Group Meeting
Salesforce Welly March 2025User Group Meeting
Anna Loughnan Colquhoun
?
Large Language Models vs Small Language Models
Large Language Models vs Small Language ModelsLarge Language Models vs Small Language Models
Large Language Models vs Small Language Models
Nathan Bijnens
?
[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...
[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...
[QUICK TALK] "Coaching 101: How to Identify and Develop Your Leadership Quali...
Fwdays
?
WSO2Con 2025 - Architecting Cloud-Native Applications
WSO2Con 2025 - Architecting Cloud-Native ApplicationsWSO2Con 2025 - Architecting Cloud-Native Applications
WSO2Con 2025 - Architecting Cloud-Native Applications
WSO2
?
Slack Social Meetup Connect, Collaborate & Grow!.pptx
Slack Social Meetup Connect, Collaborate & Grow!.pptxSlack Social Meetup Connect, Collaborate & Grow!.pptx
Slack Social Meetup Connect, Collaborate & Grow!.pptx
SanjeetMishra29
?
"Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest...
"Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest..."Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest...
"Conflicts within a Team: Not an Enemy, But an Opportunity for Growth", Orest...
Fwdays
?
Think Like and Architect Series: Session 1 of 9 Declarative Design
Think Like and Architect Series: Session 1 of 9 Declarative DesignThink Like and Architect Series: Session 1 of 9 Declarative Design
Think Like and Architect Series: Session 1 of 9 Declarative Design
Walter Spinrad
?
UiPath Automation Developer Associate Training Series 2025 - Session 5
UiPath Automation Developer Associate Training Series 2025 - Session 5UiPath Automation Developer Associate Training Series 2025 - Session 5
UiPath Automation Developer Associate Training Series 2025 - Session 5
DianaGray10
?
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on CodeWSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2
?
"AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea...
"AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea..."AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea...
"AI-Driven Automation for High-Performing Teams: Optimize Routine Tasks & Lea...
Fwdays
?
Diving into LTI: From the basics to Deep Linking
Diving into LTI: From the basics to Deep LinkingDiving into LTI: From the basics to Deep Linking
Diving into LTI: From the basics to Deep Linking
Rustici Software
?
Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...
Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...
Redefining Efficiency in AI: The Impact of 1.58-bit LLMs on the Future of Com...
Gregor Lyttek
?

Vault Associate Certification Internals

  • 4. OVERVIEW THESE NOTES FOLLOW HASHICORP SPECIFIC STRUCTURE FOUND HERE s HTTP www.VAVLTPROJECT.IO Docs INTERNALS SECURITY OVERVIEW ARCHITECTURE PROPERTIES FUNCTIONS WHAT IS VAULT eggs EffFE sAEEffffs TIGHTSECURITY CONTROLS AUDIT LOGS L v s API keys PASSWORDS CERTS
  • 5. FEATURES SECURE 1 SECRET SECRET ENCRYPTION STORAGE STORAGE PROVIDETEMPACCESS to APP 2 DYNAMIC 4 SECRETS r 3 I I NEED v ACCESS GENERATE ENCRYPT ENCRYPT AND DATA ENCRYPTION i DATA DECRYPT WITHOUT DECRYPT STORINGINVAULT LEASING AND a REVOCATION SECRETRENEWAL ALLSECRETSHAVE Ability toRevokeLEASEASSOCIATED entiretree of secrets
  • 6. ARCHITECTURE HTTPS IAPI TOKENSTORE POLICYSTORE AUDIT CORE ROLLBACKMGR EXPIRATIONMGR BROKER d AUDITw PATH ROUTING DEVICE A SYSTEM SECRET AUTH AUDIT BACKEND ENGINE METHOD DEVICE STORAGEBACKEND 0 HTTPS API EXTERNALFACING t BARRIER Vault Startsin Sealed state 1 MustUnseal Mustbe How Unsealed V Unsealkeys Alldata to Howsthrough SHAMIR'SSECRETSHARING Algorithm cryptographic barrier seal
  • 7. SHAMIRS SECRET SHARING ALGORITHM ENCRYPTION MASTER KEY KEY SHARES s I 2 ABLETO DECRYPT DATA L ENTERUIVSEALED STORAGE STATE BACKEND UNSEALED Loads all audit devices Auth methods VAULT Secrets Engines ONCEUNSEALED REQUESTSCANBE Managethe flow of requestsPROCESSEDBYTHE CORE CORE Enforce ACLs Audit logging
  • 8. I 1 Authentication O CORE MA f D 2 RETURN LIST OF POLICIES Named ACLS VAULT OPERATES EXCLUSIVELY IN WHITELIST MODE Access must be explicitly granted 2 O o or my TOKEN STORE HERE AREMY 1 CLIENTTOKENGENERATED f POLICIES j ATTACH LEASE 0 I f REQUEST SECRET CORE 2 SECRET ENGINE IIFiiiIIII N r CLIENT TOKEN I'MTelling 4 i.e Returning Secret EXPIRATION MANAGER 3 Attaching lease ID
  • 9. HIGH AVAILABILITY DESIGN MINIMISE DOWNTIME GOAL NOT TO BE140120NTALLY SCALABLE BOUND13410 NOT CPU HA MODE STATE EITHER L J IF aSEALED STANDBY 7 ACTIVE FAILS NETWORKCONNECTIVITY SEND THEN X PROCESSREQUESTS HERE v SEND TO STANDBY MUST BEUNSEALED PERFORMANCE is SIMILAR TO STANDBY BUT STANDBY CAN SERVICEREADONLY REQUESTS NODES SCALE NODES I 2 3 4 5 V SCALE IOPS HORIZONTALLY
  • 10. INTEGRATED STORAGE VAULT INTEGRATED STORAGE t l t l t l v s 17A REPLICATION BACKUPAND RESTORE WORKFLOWS RAFT CONSENSUS PROTOCOL BASED ONPAXOS BUTSIMPLER CANSOMEONE EeiiEIIIIII VOTEFORME tfIfD Ok PEERNODE NODE START CANDIDATE STATE I WILLPROMOTE MYSELF te Np LEADERGREAT I CANACCEPT FOLLOWER IDEA STATE LOG ENTRIES STATE FROM A LEADER ICANACCEPTNEW GENTRIES AND I CAN VOTE REPLICATE TO ALLTHEOTHER FOLLOWERS NO ENTRIES FOR AWHILE
  • 11. RAFT CONSENSUS PROTOCOL CONTINUED LEADER CLIENT REQUEST 1 APPEND A NEW LOG ENTRY 2 REPLICATE TO STORAGE FOLLOWERS 3QUORUM COMMITTED GO KEY VALUE Collection offinite STORE Stateswithtrasitions FINITE betweenthemAsnew STATE logsare appliedFSMis MACHINE allowedtotransitionbetween BOLTDB StatesApplicationoflogs Mustresultinthesamestate Deterministic This is the FSM AllowsVault whichmaintains snapshots to be cluster state very lightweight RECOMMENDED I 2 3 4 5 3 or 5 NODES DUE TOQUORUM
  • 12. CONFIDENTIALITY SECURITY MODEL INTEGRITY AVAILABILITY ACCOUNTABILITY AUTHENTICATION EAVESDROPPING CONFIDENTIALITY OF STORED SECRETS 9 TAMPERING WITHDATA HREAT MODEL ACCESSTO DATA CONTROLS WITHOUT ACCOUNTABILITY ACCESSTODATA v WITHOUT AUTH AVAILABILITY OFDATA IN THE FACE OF FAILURE VAULTVALIDATES CLIENTTOKENAND a 2MAN RULEFOR NOTEXPIREDREVOKED UNSEALUSING INTERNAL SHAMIRSECRETSHARING DEFAULT a THREAT MUST BE ROOT FOR DENY SPECIFICTASKS EXTERNAL 256 BIT AES IN TL5t Gcm WITH 96 BIT TOKEN THREAT noncesFORALLDATA LEAVINGVAULT J CLIENT UNTRUSTED BY STORAGE DESIGN BACKEND ENCRYPTED
  • 13. TELEMETRY TELEMETRY VAULT SERVERCOLLECTS VARIOUS RUNTIMEMETRICS I VIEW RAW DATA PERFORMANCE OF DIFFERENT 7 WIN BREAK LIBRARIESANDSUBSYSTEMS SENDSIGNALTO VAULT PROCESS LINUX 05121 v AGGREGATED AT RETAINED FOR 10SECONDINTERVALS 1 MINUTE AUTH METHODS r MERKLETREE AND REPLICATION WRITEAHEAD LOG POLICY AND TOKEN METRICS AUDIT INTEGRATED SECRET ENGINE RAFT in STORAGE CORE LEADERSHIPCHANGES RUNTIME I INTEGRATED STORAGE RAFT BACKEND STORAGE
  • 14. TOKEN AUTHENTICATION TOKEN CORECLIENTAUTH AUTH 7 BUILT IN TOKEN ID Primary ID Randomly Generated Display Name Properties Meta data for auditlogging Immutable Number of Uses Optional Once Created ParentID Optional Parent created token Policies associated list of ACL policies SourcePath Path generated TOKENCREATED auth token create I Parent Toker TOKEN TREES Child tokens from subset of parent policies Tokenrevoked entire subtree revoked
  • 15. KEY ROTATION START VAULT SEALED STATE UNSEAL 5 KEYS SHAMIR'SSECRET KEY ROTATION CHANGE UNSEAL KEYS MASTERKEY BACKENDENCRYPTION KEY OPERATION ROTATE CHANGE ENCRYPTION KEY 7 v u CANBEDONE NEW KEYGENERATEDAND REILEY c ONLINE ADDED TO KEYRING MEETTHRESHOLD GENERATE s OFCURRENTUNSEAL MASTERKEY KEYS
  • 16. REPLICATION VAULT ENTERPRISE FOCUS ON HAFOR a REPLICATION PRIMARY SECONDARYG N GLOBALDEPLOYMENTS ASYNCHRONOUS REPLICATION SCALETHROUGHPUT USE CASES MULTI DCDEPLOYMENTS SINGLEVAULTCLUSTER IMPOSESHIGHLATENCY ENCRYPTIONASSERVICE v USERSMAYGENERATE Backup sites HIGHVOLUMEOFTRAFFIC BCPFORLOSSOFDC SIMPLE To DESIGN GOALS AVAILABILITY OPERATE TOLERATEREDUCED CONSISTENCY NEARREALTIME CONFLICT TRANSPARENTTO FREE CLIENTS 1 WRITECONFLICTS DO NOTTAKEPLACE
  • 17. REPLICATION ARCHITECTURE BASED ONDESIGN GOALS TEBACKEND CONSUL y STORAC THATSUPPORTSTRANSACTIONAL UPDATES MULTIPLE KEYHALVEUPDATES ATOMICALLY WRITESAREVISIBLE REPLICATION I 4 CLUSTER MAINTAIN A LOGSHIPPING WRITE AHEAD LOG WAL L S OFALLUPDATES REPLICATE PRIMARY SECONDARY CHANGES f t AUTHORITATIVE READSECRETS PERFORM 1 SENDDATATHROUGH TRANSIT LOG WRITETOSTORAGE FORWARDWRITES TO PRIMARY SHIPPING 1 I 1 IF SECONDARY15 MODIFYPOLICY MODIFYSECRETS NEWORTOOFAR BEHINDprimary 1NOTENOUGHWALS BROKENCONNECTION SOURCE 1 PRIMARY X SECONDARY op VAULTMAINTAINS TRUTH MERKLEINDEX OFENCRYPTED WRITESCONTINUE FEETYED KEYS r STAYLOCAL NOREPLICATION TOKENSORLEASES PRIMARY COMPARETO SECONDARY VENTMUST WHICHKEYS UT AUTHIFSWITCH OFSYNC OSTERS PERFORMANCE I INDEXUPDATED IN COULD BEPOWER MEMORY Loss ? CONSISTENCY OF INDEX6000TOF INDEX UNDER T SYNC FAIL CONDITION ARIES ALGORITHM
  • 18. PLUGIN SYSTEM COMMUNICATES OVER RPC COMPLETELY SEPERATE STANDALONE APPLICATIONS ALL AUTH AND SECRET PLUGINSBACKENDS DOES NOT SHARE SAME MEMORY SPACE TREATBUILTIN ANDEXTERNAL PLUGINLIKE PLUGIN CAN NOT CRASH VAULT ENTIRELYLEGO