
Celestina Amadi
Moniepoint inc, Cloud Engineer
Lagos, Nigeria
Actions
Celestina Amadi is a Cloud Engineer with over three years of experience in multi-cloud and hybrid environments, she specializes in Infrastructure as Code, Kubernetes, and securing cloud-native applications. Celestina is passionate about sharing knowledge and empowering teams to implement scalable and compliant infrastructure
Area of Expertise
Topics
Set up secure secret management: Vault, Packer, Terraform, GCP, Kubernetes
In today's cloud-native ecosystem, managing sensitive information such as API keys, passwords, and certificates securely is paramount. This talk delves into the integration of robust secret management practices using HashiCorp Vault, Packer, and Terraform within a Google Cloud Platform (GCP) and Kubernetes environment. Attendees will learn how to set up a secure secret management pipeline that ensures secrets are stored, accessed, and rotated securely.
The session will cover the deployment of Vault as a centralized secrets manager, the use of Packer to create secure machine images, and Terraform for infrastructure as code to automate and enforce security policies. Additionally, we'll explore how to seamlessly integrate these tools with Kubernetes to manage secrets at the application level, ensuring a secure and scalable cloud infrastructure. Whether you're a DevOps engineer, cloud architect, or security professional, this talk will provide you with practical insights and best practices to enhance your secret management strategy.
Attendees will gain a deep understanding of key concepts like auto unseal and manual unseal, exploring their configurations and use cases. The session will highlight practical implementations tailored to meet compliance requirements and show how Vault can simplify secret management in hybrid and multi-cloud environments.
By the end of this talk, participants will walk away with actionable insights on setting up and securing their secret management systems, as well as tools and techniques to ensure scalability and maintain compliance.
Technical Requirements:
Basic understanding of cloud computing, Kubernetes, and infrastructure-as-code (IaC) tools. A Google Cloud Platform (GCP) account with billing enabled. Packer, Terraform, and kubectl installed on your local machine. HashiCorp Vault CLI installed for testing and interaction.
Outline
1. Why We Need Vault:
Importance of secure secret management.
Risks of hardcoding secrets or using insecure storage.
Benefits of using HashiCorp Vault for dynamic secrets, encryption, and access control.
2. Creating a Hardened Vault Image with Packer:
Walkthrough of the Packer template and shell script.
Best practices for hardening the VM image.
Storing the image in GCP for reuse.
3. Configuring Vault for Auto-Unseal Using GCP KMS:
Explanation of Vault's sealing/unsealing mechanism.
Setting up GCP KMS for auto-unseal.
Modifying the Vault configuration (`config.hcl`) to enable auto-unseal.
4. Terraform Setup for the Environment:
Explanation of Terraform files to deploy the hardened Vault image.
Creating a managed instance group, autoscaling group, and load balancer.
Applying the Terraform configuration to provision the infrastructure.
5. Service Account and ClusterRoleBinding in Kubernetes:
Creating a Kubernetes service account for Vault.
Defining a ClusterRoleBinding to grant necessary permissions.
Ensuring secure access to the Kubernetes cluster.
6. Role and Policy for Vault Authentication:
Configuring Vault roles and policies for Kubernetes authentication.
Testing the authentication flow.
Ensuring least privilege access for applications.
7. Uploading Your Secrets:
Demonstrating how to store and retrieve secrets in Vault.
8. Closing:
All code snippets and configuration files will be shared via a GitHub repository for easy access.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top