Skip to main content
HashiTalks 2025 Learn about unique use cases, homelab setups, and best practices at scale at our 24-hour virtual knowledge sharing event. Register
Presentation

Secure Developer Workflows with Vault & Github Actions

Secure secrets management is a critical element of the product development lifecycle. It’s not trivial, however, to protect and manage cloud providers and other important credentials at all stages of the process. As a result, developer machines are often littered with secrets stored in unencrypted text files, and deployment pipelines are complicated by a variety of patterns for retrieving secrets. Hashicorp Vault provides an elegant secret management system that you can use to easily and consistently safeguard your local development environment as well as your entire deployment pipeline. In this talk, I will show how you can set up a secure development environment with Vault, and how you can ensure your secrets & application deployment patterns stay consistent across development, staging and production environments using GitHub Actions.

Secure secrets management is a critical element of the product development lifecycle. It’s not trivial, however, to protect and manage cloud providers and other important credentials at all stages of the process. As a result, developer machines are often littered with secrets stored in unencrypted text files, and deployment pipelines are complicated by a variety of patterns for retrieving secrets.

Hashicorp Vault provides an elegant secret management system that you can use to easily and consistently safeguard your local development environment as well as your entire deployment pipeline.

In this talk, I will show how you can set up a secure development environment with Vault, and how you can ensure your secrets & application deployment patterns stay consistent across development, staging and production environments using GitHub Actions.

More resources like this one

4/11/2024FAQ

Introduction to HashiCorp Vault

Vault identity diagram
12/28/2023FAQ

Why should we use identity-based or "identity-first" security as we adopt cloud infrastructure?

3/28/2023Presentation

Hidden Hazards: Unique Burnout Risks in Tech

3/28/2023Presentation

Vault and Boundary - Managing Secrets at Home