Partially Redacted: Data, AI, Security, and Privacy

Introduction to Zero Trust Infrastructure with Hashicorp’s Rosemary Wang


Listen Later

Zero trust infrastructure is an approach to security that requires all users, devices, and services to be authenticated and authorized before being granted access to resources. Unlike traditional security models that assume everything inside the network is trusted, zero trust assumes that all traffic is untrusted.


In today's world, where cyber threats are becoming increasingly sophisticated, Zero trust infrastructure is crucial for protecting sensitive data and preventing unauthorized access.

Hashicorp is a company that provides a suite of tools for building and managing secure systems. Their products, such as Vault, Consul, and Boundary, can help organizations implement a zero trust approach to security.


Vault is a tool for securely storing and managing secrets such as passwords, API keys, and certificates. It provides a centralized place to manage access to secrets and has several features to ensure the security of these secrets, such as encryption, access control, and auditing.

Consul is a service discovery and configuration tool that provides a secure way to connect and manage services across different networks. It provides features such as service discovery, health checking, and load balancing, and can be integrated with Vault for secure authentication and authorization.

Boundary is a tool for securing access to infrastructure and applications. It provides a secure way to access resources across different networks and can be integrated with Vault and Consul for secure authentication and authorization.

Rosemary Wang, Developer Advocate at Hashicorp joins the show to explain zero trust infrastructure and how Vault, Consul, and Boundary help organizations build zero trust into their architecture.

Topics:

  • Why do you think we need developer tooling for access and authorization at a lower level within someone’s infrastructure?
  • Can you explain what zero trust is and why it's important for modern security architectures?
  • How does HashiCorp Vault, Boundary, and Consul fit into a zero trust security model?
  • What is HashiCorp Vault and what problem does it help a company solve?
  • What are some common use cases for HashiCorp Vault, and how can it help organizations with their security and compliance requirements?
  • How does HashiCorp Vault handle secrets rotation and expiration?
  • What is application based networking and how does this concept relate to HashiCorp Consul?
  • Can you walk us through the process of setting up and configuring HashiCorp Consul for a typical enterprise environment?
  • What are some common challenges or pitfalls that organizations face when using HashiCorp Consul, and how can they overcome them?
  • How does Boundary simplify remote access to critical resources in a zero trust environment?
  • What are some common use cases for HashiCorp Boundary, and how can it help organizations with their security and compliance requirements?
  • How does HashiCorp approach balancing security with ease of use for its products?
  • Can you talk about any upcoming features or developments in Vault, Boundary, or Consul that users should be excited about?
  • Resources:

    • @joatmon08

    ...more
    View all episodesView all episodes
    Download on the App Store

    Partially Redacted: Data, AI, Security, and PrivacyBy Skyflow

    • 4.8
    • 4.8
    • 4.8
    • 4.8
    • 4.8

    4.8

    19 ratings


    More shows like Partially Redacted: Data, AI, Security, and Privacy

    View all
    Security Now (Audio) by TWiT

    Security Now (Audio)

    1,952 Listeners

    This American Life by This American Life

    This American Life

    90,380 Listeners

    Uncanny Valley | WIRED by WIRED

    Uncanny Valley | WIRED

    365 Listeners

    Freakonomics Radio by Freakonomics Radio + Stitcher

    Freakonomics Radio

    32,109 Listeners

    a16z Podcast by Andreessen Horowitz

    a16z Podcast

    1,008 Listeners

    Software Engineering Daily by Software Engineering Daily

    Software Engineering Daily

    624 Listeners

    Hidden Brain by Hidden Brain, Shankar Vedantam

    Hidden Brain

    43,343 Listeners

    Acquired by Ben Gilbert and David Rosenthal

    Acquired

    3,636 Listeners

    The Daily by The New York Times

    The Daily

    112,729 Listeners

    Up First from NPR by NPR

    Up First from NPR

    56,140 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    304 Listeners

    Lex Fridman Podcast by Lex Fridman

    Lex Fridman Podcast

    12,694 Listeners

    All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

    All-In with Chamath, Jason, Sacks & Friedberg

    8,385 Listeners

    Hard Fork by The New York Times

    Hard Fork

    5,377 Listeners