HashiCorp Vault
Overview
Firefly can integrate with HashiCorp Vault to track secrets engines and configurations. This integration allows you to ensure your Vault setup follows infrastructure as code principles. The integration focuses on tracking Vault's configuration and setup, not the secrets themselves, aligning with infrastructure as code principles while maintaining security best practices.
Prerequisites
HashiCorp Vault server with administrative access
Vault server address
A token with appropriate policies to read mounts and configurations
Access to create and manage policies
Ability to configure authentication methods
Setup Procedure
1. Create Required Policy
Log in to your HashiCorp Vault account
Navigate to Policies
Create a new policy with the following permissions:
2. Configure Authentication
Navigate to Access
Enable a new auth method of type
userpass
Create a new user
Attach the previously created policy to the user
3. Verify Integration
Go to the Inventory page
Filter by Data Source = HashiCorp Vault
Verify that your Vault configurations are showing up correctly
Configuration Details
Supports monitoring of:
Secrets engines
Authentication methods
Mount points
Policy configurations
Regular scanning of Vault configurations
Integration with Firefly's inventory management
Support for policy enforcement on Vault resources
Ability to create policies for:
Ensuring specific secrets engines are enabled
Verifying authentication methods are properly configured
Checking for required mount points
Best Practices
Use read-only credentials for integration
Regularly verify the integration is working as expected
Monitor for configuration changes that might affect the integration
Focus on integrating tools where Firefly adds value
Keep track of which Vault configurations are being monitored
Review and update policies as needed
Maintain proper access controls in Vault
Troubleshooting
For authentication issues:
Verify token permissions
Check if the token has expired
Ensure the policy is correctly configured
Verify Vault server address is correct
For asset discovery issues:
Verify the integration is active in Firefly
Check if the token has access to required paths
Review Firefly integration logs
Verify Vault mount points are accessible
For policy enforcement issues:
Verify the asset types are supported
Check policy configuration
Review Firefly policy logs
Ensure Vault resources are properly configured
Note: This integration focuses on tracking Vault's configuration and setup, not the secrets themselves. This approach aligns with infrastructure as code principles while maintaining security best practices.
Last updated
Was this helpful?