Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Secure Secret Management with Vault on GCP & Kubernetes

HashiCorp
04/09/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • HashiCorp Vault centralizes secret management with identity-based authentication, encryption at rest and in transit, and granular access controls that prevent credential exposure in code repositories
  • Packer creates hardened Vault VM images with pre-configured security settings and GCP KMS auto-unseal, while Terraform provisions the infrastructure through automated GitHub Actions workflows
  • Kubernetes integration uses service accounts, cluster role bindings, and Helm-deployed agent injectors to dynamically inject secrets into pods without embedding credentials in container images
  • The implementation demonstrates a complete DevOps workflow from image creation to deployment, enabling repeatable infrastructure provisioning and compliance-ready secret management across hybrid cloud environments

HashiCorp Vault Fundamentals and Architecture

This session introduces HashiCorp Vault as a centralized secrets management solution that authenticates and authorizes access based on identity. Vault encrypts data both in transit and at rest, provides comprehensive audit logging, and eliminates the risk of credential exposure by removing secrets from configuration files and code repositories. The presentation emphasizes Vault's role in preventing data breaches through granular access controls that allow administrators to define specific permissions for listing, reading, or updating secrets. Dynamic secrets generation is highlighted as particularly valuable for database credential management, ensuring that even database administrators don't have persistent access to sensitive credentials.

Infrastructure as Code Implementation with Packer and Terraform

The technical implementation demonstrates using Packer to create hardened Vault VM images that eliminate manual installation and configuration steps. The Packer build process installs Vault version 1.8, creates a dedicated user without home directory access for enhanced security, configures file-based storage, and integrates with GCP KMS for auto-unseal capabilities. Terraform then provisions the infrastructure using the pre-built image, defining network configurations, firewall rules, and compute instances. This approach enables repeatable, version-controlled deployments through GitHub Actions workflows that automate both image creation and infrastructure deployment to Google Cloud Platform.

Kubernetes Integration and Secret Injection

The session covers integrating Vault with Kubernetes clusters through the Kubernetes authentication method, which requires cluster IP addresses and certificates for secure connectivity. A service account and cluster role binding are created within the Kubernetes environment, while corresponding roles and policies are configured on the Vault server. The implementation uses Helm charts to deploy the Vault agent injector, which automatically injects secrets into pods that require them through annotations. This architecture allows applications running in Kubernetes to retrieve secrets dynamically without embedding credentials in container images or deployment manifests, supporting compliance requirements and simplifying secret rotation across hybrid and multi-cloud environments.

Chapters

0:00 - Introduction and Session Overview
1:26 - What is HashiCorp Vault
2:19 - How Vault Works
3:40 - Why Organizations Need Vault
4:45 - Authentication Methods and Secret Engines
5:05 - Tools Overview: Packer, Terraform, GCP, Kubernetes
6:10 - Code Walkthrough: GitHub Actions and Terraform
8:42 - Packer Installation Script and Configuration
10:03 - Helm Charts for Kubernetes Integration
12:01 - Live Demo: Vault Server Setup
14:14 - Creating Secrets and Authentication Methods
16:15 - Kubernetes Role and Policy Configuration

Key Quotes

1:31 "It's just a tool that organizations use to manage secrets, sensitive data, and store and encrypt secrets."
2:22 "Vault authenticates and authorize access to secrets based on identity."
3:58 "Instead of storing secret directly on configuration files, we use Vault to centralize them and reduce risk of exposure."
4:28 "I like this dynamic secret most times when I'm working with databases, like you make sure that even the DBAs don't have access to those credentials that they think they have access to."
5:42 "Packer packages this, and they make sure that it is in an image format where we can now pull it using our Terraform."

Categories:
  • » Cybersecurity » Application Security
  • » Data Management » DevOps
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • DevSecOps
  • Technical Deep Dive
  • How-To
  • Identity & Access
  • Compliance & Governance
  • Secret Management
  • HashiCorp Vault
  • Infrastructure as Code
  • Kubernetes Security
  • Google Cloud Platform
  • DevOps Automation
  • Compliance and Audit
  • Dynamic Secrets
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Secure Secret Management with Vault on GCP & Kubernetes

              Upcoming Webinar Calendar

              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026
                https://www.truthinit.com/index.php/channel/1868/insights-into-saas-data-protection-from-the-keepit-annual-data-report-2026/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights
                https://www.truthinit.com/index.php/channel/1886/detecting-cyber-attacks-before-they-evolve-into-breaches-with-ai-insights/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implement Effective Strategies for Securing Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/implement-effective-strategies-for-securing-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Findings
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-findings/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Transforming AI from fantasy to purposeful management
                https://www.truthinit.com/index.php/channel/1924/transforming-ai-from-fantasy-to-purposeful-management/

              Upcoming Events

              • Apr
                30

                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026

                04/30/202610:00 AM ET
                • Apr
                  30

                  The New Economics of a VMware Exit

                  04/30/202601:00 PM ET
                  • May
                    06

                    Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights

                    05/06/202602:00 AM ET
                    • May
                      06

                      World Password Day: Strategies for Managing Your Passwords Effectively.

                      05/06/202610:00 PM ET
                      • May
                        07

                        World Password Day: Strategies for Managing Your Passwords Effectively.

                        05/07/202605:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version