Many engineers encounter complexity while managing access and secrets and keys for public cloud environments. Most of the time, developers are given permissions to create their own sets of keys and use them wherever they want to, without any oversight. This could potentially lead to scenarios where the keys might be uploaded accidentally to Git repositories or be hardcoded within the app itself. In this talk, you will learn how you can leverage HashiCorp Vault to manage the ENTIRE lifecycle of secrets used within AWS, which includes creation, deletion, expiration, logging, and rotation of access and secret keys—a crucial component in building secure cloud infrastructure.