HashiCorp and ESYSCO join forces

As companies migrate to the public cloud, security will always be an inherent concern. The problems typically revolve around the fact that customers have less control over hardware and software, often losing oversight of critical operational functions.

Solutions can come from different sources, including new technologies. Thanks to our new established partnership with HashiCorp, we have a lot to offer in terms of security. We have just become an official Reseller and Integrator of HashiCorp’s solutions.

About HashiCorp

HashiCorp is a company that offers open-source tools and commercial products that enable developers, operators and security professionals to provision, secure, run and connect their own infrastructure to services offered in the cloud.

It’s a software infrastructure company with an unique approach – rather than focusing solely on technologies, they build the workflows designed to solve the real-world problems of IT operators working with multi-cloud environments.

HashiCorp offers open source and commercial software for HashiCorp Terraform, Vault, Consul and Nomad, and runs open source projects for HashiCorp Vagrant, Packer, Boundary and Waypoint.

Common purpose of ESYSCO and HashiCorp Vault – safety first

Managing secrets and credentials can be really problematic. HashiCorp Vault helps organizations reduce the risk of breaches and data exposure with identity-based security automation and encryption-as-a-service.

It allows dynamically generated users and passwords for databases or other tools like SSH. This is a feature that’s enormously beneficial to contain the sprawl of users and passwords around organisation and to keep track of who, when and what a user is doing. Most importantly, it also protects from leaked credentials causing damage to organisation.

Vault is open source, meaning that security experts worldwide can audit the code and contribute to it. It is also written in Go, which is a great language for scalable applications.

Furthermore, it can be either used to do cryptography as a service. Meaning that applications don’t need to worry about encrypting data—they just use Vault to encrypt it for them. Vault can also sign and verify this data, but it doesn’t store it. It is just used to encrypt and decrypt it. In addition, it can also generate PKI certificates. Whether you like to use the API, CLI or the UI, Vault has you covered.

In summary, HashiCorp Vault simplifies and automates the implementation of critical security management components within organizations:

• Authenticate: Authentication in Vault is the process by which a client supplies information that Vault uses to determine if they are who they say they are. Once the client is authenticated against an auth method, a token is generated and associated to a policy.

• Validation: Vault validates the client against third-party trusted sources, such as Github, LDAP, AppRole, and more.

• Authorize: A client is matched against the Vault security policy. This policy is a set of rules defining which API endpoints a client has access to with its Vault token. Policies provide a declarative way to grant or forbid access to certain paths and operations in Vault.

• Access: Vault grants access to secrets, keys, and encryption capabilities by issuing a token based on policies associated with the client’s identity. The client can then use their Vault token for future operations.

Recently HashiCorp released Vault as a service in the HashiCorp cloud platform but the main route to use Vault for companies is self-hosting it in their infrastructure.