France 01 84 17 53 28
International +972-722-405-222
Vault est un outil qui gère, stocke et protège les informations sensibles d'une manière qui réduit la propagation des secrets et d'une manière qui permet aux grandes organisations de les exploiter confortablement et ce également pour de grandes quantités d'informations.
Dans un monde où les informations confidentielles sont distribuées de manière globale, cela est particulièrement critique lors du déploiement d'une infrastructure sur plusieurs clouds (publics et privés).
Vault peut également être considéré comme un outil qui fait office de coffre-fort central pour l'organisation.
Feature |
Open SourceSecrets management and data protection |
EnterpriseCollaboration and operations features; Multi-datacenter, Scale, Governance and Policy features for organizations Pour un devis |
|
---|---|---|---|
CUSTOMER SUPPROT & SLA | |||
Support
|
- | ||
SECRETS MANAGEMENT | |||
Dynamic Secrets
Dynamic secrets are generated on demand and are unique to a client and can be revoked immediately after use, minimizing the life of the secret
|
|||
Secret Storage
Encrypt data while at rest, in the storage backend of your choice
|
|||
Secure Plugins
Improve the extensibility of Vault with pluggable backends
|
|||
Detailed Audit Logs
Vault stores a detailed audit log of all authenticated client interaction (authentication, token creation, secret access, secret revocation, etc.)
|
|||
Leasing & Revoking Secrets
Manage authorization tokens throughout your infrastructure: Create time-based tokens for automatic revocation or manual revocation
|
|||
ACL Templates
Support templating for identity groups, entities, and metadata within ACL policies
|
|||
Vault Agent
Automatically manage the secure introduction and renewal of tokens for local applications
|
|||
Init & Unseal Workflow
Web browser accessible workflow
|
|||
Key Rolling
Key Rolling allows the ability to update and roll new keys throughout distributed infrastructure while retaining the ability to decrypt values encrypted with past key versions
|
|||
UI with Cluster Management
Perform all CLI/API actions from one easily accessible browser interface for secret administration and Vault multi-datacenter cluster management
|
|||
Entities & Identity Groups
An integrated system for understanding the identity of a person or system across their logins and tokens and using this information for policy and access control decisions
|
|||
Access Control Policies
Create and manage policies that authorize access control throughout your infrastructure and organization
|
|||
Identity Plugins
Extend Vault with pluggable authentication methods to directly integrate with your trusted identity providers
|
|||
Integrated Storage
Securely store persistent data in Vault without an external storage backend. Integrated Storage supports High Availability and Replication
|
|||
Rate Limit Quotas
Limit maximum amount of requests per second (RPS) to a system or mount to protect network bandwidth
|
|||
Data Protection | |||
Encryption as a Service
Encrypt application data during transit and at rest.
| |||
Transit Backend
Encrypt and decrypt application data with a HTTP (TLS) API call. Key management, encryption algorithm, and more are offloaded and centrally managed by Vault.
| |||
Encryption Key Rolling
Encryption key rolling.
| |||
Identity-based Access | |||
Entities & identity groups
An integrated system for understanding the identity of a person or system across their logins and tokens and using this information for policy and access control decisions.
| |||
Access Control Policies
Create and manage policies that authorize access control throughout your infrastructure and organization.
| |||
Identity plugins
Identity plugins.
| |||
AWS KMS Auto-unseal
Automatically unseal Vault clusters using AWS Key Management System.
| |||
Azure Key Vault Auto-Unseal
Automatically unseal Vault clusters using Azure Key Vault System.
| |||
GCP Cloud KMS Auto-unseal
Automatically unseal Vault clusters using GCP Cloud Key Management System.
| |||
ENTERPRISE PLATFORM | |||
Disaster Recovery
Failover Vault clusters from one data center to another with limited downtime.
| - | ||
Namespaces
Provide Secure Multi-tenancy within Vault via isolated, self-managed environments.
| - | ||
Monitoring
Monitor Vault telemetry and log data with Splunk
| - | ||
Multi-DataCenter Module | |||
Replication
Replication provides high availability replication of secrets and policies across multiple data centers and clouds and is built around global deployments of Vault.
| - | ||
Replication Filters
Selectively whitelist/blacklist and activate or deactivate mounts for Secret Mounts for Replication.
| - | ||
Read Replicas
Multiply read performance for Vault Enterprise infrastructure via a new type of performance-focused node within Vault to speed up read performance within a single cluster. This is particularly useful for clusters with a high amount of throughput.
| - | ||
Path Filters
Path filters allow for mounts within namespaces to be filtered similar to existing mount filters, allowing for namespace admins to specify what secrets within a namespace will be omitted from performance replication
| - | ||
Governance & Compliance Module | |||
Control Groups
Require multiple Identity Entities or members of Identity Groups to authorize an requested action before it is allowed to run.
| - | ||
HSM Auto-unseal
Vault integrates HSM Master Key Wrapping and Automatic Unsealing for HSM installations.
| - | ||
Multi-factor Authentication
Enforce MFA workflows when accessing a secret or a secret path.
| - | ||
Sentinel Integration
Take advantage of HashiCorp Sentinel to provide extremely flexible access control policies -- even on unauthenticated endpoints.
| - | ||
FIPS 140-2 & Seal Wrap
Vault can take advantage of FIPS 140-2-certified HSMs to ensure that Critical Security Parameters are protected in a compliant fashion.
| - | ||
Entropy Augmentation
Entropy Augmentation","description":"Entropy Augmentation allows Vault Enterprise to sample entropy (or randomness for cryptographic operations) from an external source via the seals interface
| - | ||
Lease Count Quotas
Limit the number of leases generated in a system or mount to protect system stability and storage performance at scale
| - | ||
Advanced Data Protection Module | |||
KMIP
Integrate with trusted enterprise databases and workloads via KMIP protocol
| - | ||
Transform
A powerful new way to protect sensitive data (SSN, PII, PCI, credit cards, etc), data structure, and masking across clouds, applications, and systems","offeredIn
| - | ||
CUSTOMER SUPPROT & SLA | |||
Support
|
- | ||
Pricing | Free | Pour un devis |
Vault Enterprise has been pivotal in how we've deployed some of our architecture
Tyler Haley, Cloud Service Provider Lead, US Department of Defense
Our developers at Adobe found HashiCorp Vault to be "head and shoulders" above anything else we tested
Chandler Allphin, Lead Security Engineer, Adobe
Using keys with Vault Enterprise is the most secure way we could found
Nir Koren, DevOps CI/CD Team Leader, LivePerson