Empowering Credential Injection at Scale Using Boundary
In this session, we'll explore how an organisation can experience passwordless authentication to their SSH servers at scale using Boundary and ephemeral SSH certificates from Vault . We'll see how SSH certificates are different from regular SSH keys and how do we automate the whole process using dynamic credential templating.
Elevating Security: The Art and Science of Password Vault Management in Boundary
In the dynamic landscape of cybersecurity, where the safeguarding of sensitive credentials is paramount, HashiCorp Boundary emerges as a game-changer. Join me on an illuminating journey as we explore the intricate interplay of art and science in the realm of password vault management within HashiCorp Boundary.
I'll dissect best practices, offering practical insights into configuring, securing, and optimizing the native password vault in HashiCorp Boundary. Discover how organizations leverage HashiCorp Boundary's password vault to secure critical credentials, streamline access workflows, and fortify their overall security infrastructure.
Leading a privileged life without leaking secrets
In cloud environments, resources often reside in private networks. In traditional approaches, for developers or operators to access these resources, organizations often end up with VPNs or bastion hosts. Moreover, they also use static credentials for accessing these applications. But this approach has many challenges like scalability and eventually increases the attack surface.
In this context, I’ll discuss how HashiCorp Boundary and Vault come to the rescue and how their integration helps us achieve the core fundamental of zero trust security: “Trust Nothing. Authenticate and Authorize Everything.
Zero Trust Security with Boundary and Vault
In cloud environments, resources often reside in private networks. In traditional approaches, for developers or operators to access these resources, organizations often end up with VPNs or bastion hosts. Moreover, they also use static credentials for accessing these applications. But this approach has many challenges like scalability and eventually increases the attack surface.
In this context, I’ll discuss how HashiCorp Boundary and Vault come to the rescue and how their integration helps us achieve the core fundamental of zero trust security: “Trust Nothing. Authenticate and Authorize Everything.
HashiTalks: Secure Sessionize Event
HashiTalks 2023 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top