Secure second days operations with Boundary and Vault.pdf
attachmentgenie
30 views
39 slides
Jun 11, 2024
Slide 1 of 39
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
About This Presentation
We now live in the age of cloud native which also means that we now have an incredibly dynamic fleet of nodes to maintain. Instead of injecting a well known SSH key into our entire infrastructure this talk will show how we can utilise Boundary and Vault to build a zero trust system. This than allows...
We now live in the age of cloud native which also means that we now have an incredibly dynamic fleet of nodes to maintain. Instead of injecting a well known SSH key into our entire infrastructure this talk will show how we can utilise Boundary and Vault to build a zero trust system. This than allows us to hook boundary up to a config management tool like ansible to manage our nodes
Size: 1.97 MB
Language: en
Added: Jun 11, 2024
Slides: 39 pages
Slide Content
Secure second day
operations with
Boundary and
Vault
Bram Vogelaar
@attachmentgenie
“I bet I know the most
powerful user in your
platform”
“I am 99.9% sure it is not
root”
“It probably is your own ssh key”
“I am also pretty sure it’s
as old as your platform”
~ ❯ whoami
Previously a Molecular Biologist
Then became a Dev, now an Ops
CODE EDITOR
tee readonly.sql <<EOF
CREATE ROLE "{{name}}" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}'
INHERIT;
GRANT ro TO "{{name}}";
EOF