Hi Jason/Craig,
I literally just wrote something similar on the list so I'll repeat it
here :-D But first, to correct something:
> As a side note, Hashicorp offers an enterprise Vault solution, you can pay
> them to run it for you.
We don't! Vault Enterprise isn't hosting, it's enterprise-focused
features. But I think there are some other companies out there that
will do hosting.
Here's my immediate list:
* Keep your Vault servers minimal -- have them be standalone with
nothing else running, especially network services. This helps keep the
attack surface low. In many modern infras this basically means
treating Vault servers like special snowflakes...but it's a worthwhile
tradeoff for a security product.
* Limit the number of accounts and/or people that can log in. A user
that can log in locally is one that can be attacked remotely.
* Use firewalls to restrict access to non-Vault services (e.g. SSH) to
local IPs rather than the world at large.
* Use advanced firewall features like connection tracking/limiting to
detect attacks and limit them before they hit the Vault server.
* Make sure any authentication backends you have enabled in Vault have
good configurations, e.g. if you are using App-ID you wouldn't want an
app/service id of "test" and "test".
Best,
Jeff