// The secrets vault for cloud-native.
VAULT CHANGED HOW WE MANAGE SECRETS.
Every application needs secrets—API keys, database passwords, certificates. Vault centralizes all of this with fine-grained access control, automatic rotation, and audit logging. No more hardcoded credentials in config files.
WHY VAULT?
Vault uses dynamic secrets—credentials generated on-demand with automatic expiration. It handles encryption, PKI certificates, and integrates with Kubernetes, AWS, and more. Security without complexity.
YOUR SECRETS DESERVE BETTER.
Learn Vault from the ground up. Master KV secrets, dynamic credentials, policies, and enterprise features. Stop storing secrets in git. Start using Vault.
10 lessons. Complete secrets management.
What is Vault and why secrets management matters
BeginnerInstall Vault and start dev server
BeginnerStore and retrieve secrets
BeginnerControl access with policies
BeginnerGenerate credentials on-demand
IntermediateManage TLS certificates
IntermediateEncryption as a service
IntermediateVault Agent and K8s auth
IntermediateTrack all Vault operations
AdvancedScale Vault in production
AdvancedVault was created by HashiCorp and open-sourced in 2015. It became the standard for secrets management, with over 50 million downloads and adoption by Fortune 500 companies worldwide.
Before Vault, secrets were scattered—hardcoded in apps, stored in config files, or worse, in git. Vault provides a centralized, audited, and secure home for all your sensitive data.
Vault's key innovation is dynamic secrets. Instead of static passwords, Vault generates short-lived credentials for databases, AWS, and more. When a lease expires, the credentials are automatically revoked. This reduces the blast radius of any compromise.
Your secrets deserve a vault. Literally.
Vault is a secrets management system. It stores sensitive data (API keys, passwords, certificates), controls access through policies, and provides an audit trail of all secret access.
1. Vault manages _____, not code.
Hint: Sensitive data
2. Policies control _____ to paths.
Hint: What you can do
3. Time-limited secret access is a _____.
Hint: Rental period
4. Auth credential is called a _____.
Hint: Access key
5. Vault generates _____ credentials dynamically.
Hint: On-demand
1. Secrets
2. Access
3. Lease
4. Token
5. Dynamic
Vault runs as a single binary. Download it and you're ready.
1. Dev server is not for _____.
Hint: Real use
2. Default Vault port is _____.
Hint: 8200
3. Set address with VAULT _____ env var.
Hint: Address
1. Production
2. 8200
3. ADDR
KV (Key-Value) is Vault's basic secrets engine. Store arbitrary key-value pairs with versioning support.
1. Store secret with vault kv _____.
Hint: Add
2. Read secret with vault kv _____.
Hint: Read
3. Delete secret with vault kv _____.
Hint: Remove
1. Put
2. Get
3. Delete
Policies control access to paths in Vault. They're written in HCL (HashiCorp Configuration Language).
1. Policies written in _____ format.
Hint: Config language
2. Policy paths control _____ to secrets.
Hint: What you can do
3. Login with vault _____-method.
Hint: Auth method
1. HCL
2. Access
3. Auth
Dynamic secrets are generated on-demand when requested. They have automatic expiration via leases and can be revoked instantly.
1. Dynamic secrets are generated on _____.
Hint: When needed
2. Credentials expire after _____ duration.
Hint: Time period
3. Enable secrets engine with vault _____ enable.
Hint: Secrets
1. Demand
2. Lease
3. Secrets
Vault can act as a Certificate Authority (CA), generating TLS certificates dynamically for your services.
1. Vault acts as Certificate _____.
Hint: CA
2. Enable PKI with vault _____ enable pki.
Hint: Secrets
3. Generate certs with pki/_____ command.
Hint: Get certificate
1. Authority
2. Secrets
3. Issue
Transit is Vault's encryption-as-a-service. It encrypts data so you don't need to manage encryption keys yourself.
1. Transit provides _____ as a service.
Hint: Data protection
2. Enable transit with vault _____ enable transit.
Hint: Secrets
3. Encryption/decryption with transit _____ command.
Hint: Encrypt
1. Encryption
2. Secrets
3. Encrypt
Vault can authenticate with Kubernetes using service account tokens. Applications can get secrets directly from Vault without storing long-lived credentials.
Vault Agent auto-authenticates and injects secrets into pods via annotations.
1. Kubernetes _____ enables K8s auth.
Hint: Auth method
2. _____ injects secrets into pods.
Hint: Sidecar
3. vault.hashicorp.com/role specifies _____.
Hint: Access rights
1. Auth
2. Agent
3. Policy
Vault audit devices log every operation—authentication, secret access, secret creation, and more. Essential for compliance and security investigations.
1. Audit devices _____ all Vault operations.
Hint: Record
2. Enable audit with vault _____ enable.
Hint: Audit
3. List audit devices with vault _____ list.
Hint: Audit
1. Log
2. Audit
3. Audit
Vault supports high availability with multiple server nodes. One node is the leader, others are standby. Standbys forward requests to the leader.
HA requires a distributed storage backend like Consul, etcd, or DynamoDB.
1. Vault HA uses a distributed _____ backend.
Hint: Where data lives
2. One node is the _____, others are standby.
Hint: Primary
3. Consul is a common _____ backend.
Hint: Storage
1. Storage
2. Leader
3. Storage