=Paper= {{Paper |id=Vol-3826/paper7 |storemode=property |title=Universal centralized secret data management for automated public cloud provisioning |pdfUrl=https://ceur-ws.org/Vol-3826/paper7.pdf |volume=Vol-3826 |authors=Yevhenii Martseniuk,Andrii Partyka,Oleh Harasymchuk,Svitlana Shevchenko |dblpUrl=https://dblp.org/rec/conf/cpits/MartseniukPHS24 }} ==Universal centralized secret data management for automated public cloud provisioning== https://ceur-ws.org/Vol-3826/paper7.pdf
                                Universal centralized secret data management
                                for automated public cloud provisioning⋆
                                Yevhenii Martseniuk1,†, Andrii Partyka1,†, Oleh Harasymchuk1,† and Svitlana Shevchenko2,*,†
                                1
                                    Lviv Polytechnic National University, 12 Stepana Bandery str., 79013 Lviv, Ukraine
                                2
                                    Borys Grinchenko Kyiv Metropolitan University, 18/2 Bulvarno-Kudryavska str., 04053 Kyiv, Ukraine



                                                   Abstract
                                                   In modern cloud environments, secret management plays a key role in ensuring the security of sensitive data,
                                                   such as passwords, API keys, credentials, and other critical resources. This paper discusses the use of HashiCorp
                                                   Vault as a universal platform for centralized secret management and automated provisioning of cloud resources.
                                                   A comparison is also made with native secret management services, such as AWS KMS, Azure Key Vault, and
                                                   Google Cloud KMS, to determine their capabilities and limitations in providing security. The comparison shows
                                                   that Vault offers more flexible and universal secret management thanks to advanced cryptographic methods and
                                                   integration with automation platforms. The research demonstrates that Vault provides secure storage, dynamic
                                                   creation, and automatic revocation of credentials, allowing access management based on security policies. The
                                                   integration of HashiCorp Vault with automation platforms like Rundeck and Ansible enables the automation of
                                                   cloud resource provisioning while maintaining information confidentiality and reducing the risk of human error.
                                                   The use of dynamic creation methods for temporary credentials enhances security and compliance with
                                                   standards, adhering to the principle of least privilege. The results highlight the importance of using HashiCorp
                                                   Vault as a central platform for managing secrets and credentials, which improves the overall level of security and
                                                   efficiency in cloud environments.

                                                   Keywords
                                                   HashiCorp Vault, secrets, automation, data security, dynamic credentials, AWS, authentication,
                                                   authorization, cloud infrastructure, centralized management 1



                         1. Introduction                                                             In the context of Zero Trust, effective secret management is
                                                                                                     critically important for securing access to applications,
                         In the modern world of cloud computing, infrastructure is                   systems, and endpoints. Data must be properly protected
                         becoming increasingly ephemeral (temporary) and elastic,                    and not stored in plaintext, as this poses a significant risk of
                         adapting to changing loads and needs. The dynamic nature                    unauthorized access [5]. This necessitates centralized secret
                         of IP addresses and the lack of a clear network perimeter                   management and the use of intermediary software for key
                         introduce new challenges in ensuring cybersecurity, as                      management and data encryption [6].
                         traditional protection methods based on fixed network                            A secret is considered any information that requires
                         boundaries become less effective. Consequently, modern                      strict access restrictions, such as API encryption keys,
                         security systems are oriented towards the ‘Zero Trust’                      passwords, certificates, or other credentials used for
                         principle, which assumes potential breaches within the                      authentication and authorization of access to resources [1].
                         network, regardless of its boundaries [1, 2].                               In modern conditions, most web applications and various
                             The Zero Trust concept posits that no system or user                    services have already transitioned to a microservices
                         can be trusted by default; every access request must be                     architecture or are actively undergoing this transition. This
                         thoroughly verified, whether it originates from within the                  is because microservices architecture enhances flexibility,
                         organization’s internal network or externally [3]. This                     scalability, and independence in the development and
                         approach requires more integrated security methods, where                   deployment of individual system components [3]. However,
                         access to systems and endpoints is controlled directly,                     instead of a single monolithic configuration file, there are
                         rather than relying on being within a privileged network.                   now numerous small configuration files (one or several per
                         This means that instead of using IP addresses as the sole unit              microservice), which require secure storage of their
                         of access, each application or service is given a unique                    contents.
                         identification, allowing it to work with the ephemeral and                       Additionally, environment variables are often used for
                         elastic nature of cloud infrastructure [4].                                 configuring service parameters instead of traditional
                                                                                                     configuration files. As a result, each service has its unique


                                CPITS-II 2024: Workshop on Cybersecurity Providing in Information          0009-0009-2289-0968 (Y. Martseniuk);
                                and Telecommunication Systems II, October 26, 2024, Kyiv, Ukraine        0000-0003-3037-8373 (A. Partyka);
                                ∗
                                  Corresponding author.                                                  0000-0002-8742-8872 (O. Harasymchuk);
                                †
                                  These authors contributed equally.                                     0000-0002-9736-8623 (S. Shevchenko)
                                   yevhenii.v.martseniuk@lpnu.ua (Y. Martseniuk);                                      © 2024 Copyright for this paper by its authors. Use permitted under
                                                                                                                       Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                andrijp14@gmail.com (A. Partyka);
                                garasymchuk@ukr.net (O. Harasymchuk);
                                s.shevchenko@kubg.edu.ua (S. Shevchenko)
CEUR
Workshop
                  ceur-ws.org
              ISSN 1613-0073
                                                                                                    72
Proceedings
settings for connecting to databases, external APIs, message                    robust algorithms, ensure that without the
queues, caches, and other systems [4]. Moreover, other                          appropriate decryption keys, the data remains
parameters require secure storage, such as ‘salt’ (a modifier                   inaccessible [12].
used for password hashing) or keys for generating JWT tokens.             2.    Insider Threats: Insider threats pose a significant
Thus, there is a significant number of entities that require                    risk to cloud environments. Employees or
secure storage to prevent unauthorized access [6].                              contractors with access to sensitive data may
     This research aims to identify the optimal tool for                        intentionally or unintentionally compromise
centralized secret management in cloud environments that                        security. Threshold cryptography methods and
meets modern security requirements and ensures flexibility                      distributed key management help mitigate this
and efficiency. The study includes an analysis of existing                      risk by ensuring that no individual has complete
native secret management services, such as AWS KMS,                             access to the secret key, thus limiting the potential
Azure Key Vault, and Google Cloud KMS, to evaluate their                        for malicious use of the data.
capabilities and limitations [1]. Additionally, the choice of             3.    Ensuring Data Integrity and Confidentiality:
HashiCorp Vault as the best solution for secret management                      Data integrity and confidentiality are the most
is justified due to its ability to provide advanced                             important aspects of security in cloud
cryptographic methods, dynamic credential creation,                             environments. Advanced encryption methods,
integration with various automation platforms, and support                      such as DNA-based encryption or hybrid
for a universal approach to secret management in                                cryptography, provide robust mechanisms to
heterogeneous cloud infrastructures [7].                                        protect against tampering, and unauthorized
                                                                                access and ensure that only authorized users can
2. Challenges and risks in public                                               decrypt the data.
                                                                          4.    Scalability and Performance: Scalability is a key
   clouds and native services for                                               advantage of cloud computing, but it also creates
   their mitigation                                                             security challenges. Decentralized encryption and
The rapid adoption of cloud computing has fundamentally                         other scalable cryptographic solutions enable cloud
changed approaches to data storage and management. Due                          environments to handle large volumes of data
to the high convenience, scalability, and flexibility offered                   efficiently without compromising security. They
by public cloud services such as Amazon Web Services                            provide effective key management, prevent data
(AWS), Microsoft Azure, and Google Cloud Platform (GCP),                        duplication, and enhance the overall performance of
organizations are increasingly moving to cloud technologies                     systems.
for deploying their operations and storing data. However,                 5.    Regulatory Compliance and Building Trust:
these changes come with significant challenges related to                       Implementing reliable secret storage solutions
ensuring the security and privacy of information [8].                           helps organizations not only protect their data but
Reliable secret storage solutions that include secure                           also build trust with their clients and ensure
management of keys, passwords, and other sensitive data                         compliance with regulatory requirements, such as
are critically important for protection against unauthorized                    GDPR and HIPAA. This is achieved by
access and potential data breaches.                                             demonstrating a commitment to data security and
    By moving their data and applications to public cloud                       using advanced protection methods [13].
infrastructures, organizations face some security challenges
inherent to cloud environments. Cloud environments, by                 3. Native services for secure secret
nature, involve storing data on remote servers managed by                 management
third parties. This setup creates potential vulnerabilities, as
sensitive information, such as encryption keys, passwords,             To address these issues, public cloud providers like AWS,
and certificates, must be securely managed and protected               Azure, and GCP offer their own built-in secret management
from unauthorized access [9]. The lack of effective secret             services:
management solutions significantly increases the risks of data
leaks, unauthorized access, and insider threats [10].                  3.1. AWS key management service
Therefore, the implementation of advanced cryptographic                AWS Key Management Service (KMS) provides
methods for protecting secrets in the cloud and ensuring data          centralized control over cryptographic keys used to protect
security is especially important [11].                                 data stored within AWS infrastructure. This service is
                                                                       closely integrated with other AWS cloud services, allowing
2.1. Main security challenges and risks in                             automatic encryption of data within those services and
     public clouds                                                     managing access to the keys needed for decryption.
                                                                       Integration with AWS CloudTrail enables auditing of key
    1.   Vulnerability to Unauthorized Access: The use
                                                                       operations, providing detailed information about who used
         of cloud services requires storing keys, passwords,
                                                                       specific keys, on which resources, and when.
         and certificates in a secure environment. However,
                                                                           AWS KMS also simplifies the process for developers to
         cloud environments themselves can be targets of
                                                                       add encryption or digital signing capabilities to their
         attacks, making effective secret management
                                                                       software, either directly or through the use of AWS SDK,
         critically important to prevent unauthorized
                                                                       which supports AWS Encryption SDK as the key provider
         access. Even if data is intercepted, advanced
                                                                       for encrypting and decrypting data locally in applications.
         cryptographic methods, such as encryption using


                                                                  73
The service allows the effective management of the lifecycle           3.2. Azure key vault: A native service for
and permissions of keys, including the ability to create new                secure secrets management
keys at any time and manage their permissions separately
from the rights to use them [14]. Users can choose between             Azure Key Vault is a cloud service from Microsoft
keys generated in AWS KMS or other options, such as                    designed for the secure storage of secrets and access
importing keys from their key management infrastructure,               management. Secrets are considered data that require strict
using keys stored in an AWS CloudHSM cluster, or keys                  access control, such as API keys, passwords, and
from an external key manager outside of AWS. AWS KMS                   cryptographic keys. Azure Key Vault supports two types of
also supports the automatic rotation of root keys once a year          containers: general vaults and managed Hardware Security
without the need to re-encrypt previously encrypted data,              Module (HSM) pools. Vaults are used for storing software
ensuring their long-term security. The service retains old             keys, secrets, and certificates with support for Hardware
versions of keys, making them available for decrypting                 Security Modules (HSMs), while HSM pools are exclusively
previously encrypted data. Key management is performed                 designed for storing keys protected by HSM hardware [17].
through the AWS console, AWS SDK, or AWS Command                           To ensure secure data transmission between Azure Key
Line Interface (CLI).                                                  Vault and clients, the service uses the Transport Layer
     Security and Compliance: AWS KMS is designed so                   Security (TLS) protocol. TLS ensures reliable authentication,
that even AWS employees do not have access to your                     message confidentiality, data integrity, and detection of
plaintext keys. This is achieved through the use of                    unauthorized alterations, interceptions, or message
Hardware Security Modules (HSMs) that are validated                    forgeries. Perfect Forward Secrecy (PFS) further secures
against the Federal Information Processing Standards (FIPS)            connections between clients and Microsoft’s cloud services
140-2 of the U.S. National Institute of Standards and                  by using unique keys, including 2048-bit RSA encryption
Technology (NIST). The FIPS 140-2 Cryptographic Module                 keys. This configuration significantly complicates the
Validation Program ensures that HSMs provide robust                    interception and access to data during its transmission.
protection for the confidentiality and integrity of keys.                  Access to Azure Key Vault is managed through two
     The HSMs used in AWS KMS serve as the cryptographic               interaction planes: the management plane and the data
root of trust and create a secure hardware environment for             plane.
performing all cryptographic operations within KMS. All
key material for KMS keys is generated in AWS KMS HSMs,                        Management Plane: This plane is used for
and all operations requiring access to plaintext keys are                       administering Key Vault, including creating and
strictly performed within the HSMs, in compliance with                          deleting key vaults, retrieving their properties, and
FIPS 140-2 Level 3 security requirements [15].                                  configuring access policies.
     Updates to the HSM firmware in AWS KMS are controlled                     Data Plane: This plane is intended for working
by multi-party access management and are reviewed by                            with the data stored in the vaults. It allows adding,
independent expert groups at Amazon. All firmware changes                       deleting, and modifying keys, secrets, and
are sent to an accredited NIST laboratory for verification of                   certificates.
compliance with FIPS 140-2 Level 3 security standards. Your
                                                                           Authentication in both planes is handled using the
plaintext keys are never written to disk and are only used in
                                                                       Microsoft Entra ID. The management plane employs
the volatile memory of the HSM for the duration required to
                                                                       Azure Role-Based Access Control (Azure RBAC), while the
perform the requested cryptographic operation. This applies
                                                                       data plane uses Key Vault access policies alongside Azure
to cases where keys are created on user request, imported into
                                                                       RBAC to manage operations within the vault.
the service, or created in an AWS CloudHSM cluster using a
                                                                           Access to either plane of Azure Key Vault requires
dedicated key storage function.
                                                                       proper authentication and authorization of all calling
     Regulatory Compliance and Key Geographical
                                                                       entities (users or applications). The authentication process
Control: AWS KMS allows users to choose whether to
                                                                       identifies the requesting party, while authorization
create keys restricted to a single region or keys that can be
                                                                       determines the permissible operations for that entity. Azure
used across multiple regions. This is crucial for meeting
                                                                       Key Vault uses Microsoft Entra ID to authenticate any
regulatory requirements regarding the storage and
                                                                       security principal that needs access to Azure resources [18].
processing of data within specific geographical boundaries.
Keys created for a single region are never transferred
                                                                       3.3. Security principles and authentication
outside of that region, ensuring data control within the
defined jurisdiction.
                                                                            mechanisms
     The benefits of AWS KMS include flexibility in                    A security principal in Azure is an entity that represents a
choosing encryption methods, integration with other AWS                user, group, service, or application that requires access to
services, a high level of security through the use of certified        resources. Each security principal in Azure is assigned a
HSMs, and the ability to comply with various regulatory                unique object identifier. Types of security principals include:
standards, such as GDPR or HIPAA. This makes AWS KMS
a powerful tool for ensuring data security and privacy in                      User Security Principal: Represents an individual
cloud environments [16].                                                        user with a profile in Microsoft Entra ID.
                                                                               Group Security Principal: Represents a group of
                                                                                users created in Microsoft Entra ID. Any roles or




                                                                  74
         permissions assigned to the group automatically               3.5. Data protection in Google Cloud
         apply to all its members.
                                                                       Google Cloud automatically encrypts all data using an
        Service Principal: Used to identify an application
                                                                       internal mechanism called Keystore. This is a key
         or service (a piece of code), rather than a user or
                                                                       management service that automatically generates and
         group. The object identifier for a service principal
                                                                       manages keys without user intervention. Keystore supports
         is called a client ID and serves a similar function to
                                                                       a primary key for encrypting new data encryption keys, as
         a username. The client’s secret or certificate for a
                                                                       well as a limited number of older key versions to maintain
         service principal acts as the password.
                                                                       compatibility and allow decryption of existing data. Users
    Many Azure services support the assignment of a                    do not have direct control over these keys or access to their
Managed Identity, which provides automatic management                  usage logs.
of the client ID and certificate. This is the most secure and              Data from multiple clients may be encrypted with the
recommended method of authentication in Azure, as it                   same default key. This process relies on cryptographic
reduces the risks associated with manual credential                    modules validated for compliance with FIPS 140-2 Level 1,
management [19].                                                       ensuring a high level of data protection [22].
    Azure Key Vault is a key security component in the                     Google Cloud KMS provides a comprehensive set of
Microsoft Azure ecosystem, providing reliable management               tools for managing encryption keys in the cloud
and storage of secrets. Its functionality enables                      environment, allowing organizations to protect data
organizations to control access to critical data using                 according to modern security requirements. The use of
advanced authentication, authorization, and encryption                 different types of keys, integration with other cloud
technologies that meet the highest security standards.                 services, and support for encryption standards enable
                                                                       clients to flexibly adapt the level of protection to their needs
3.4. Google cloud key management service                               and to ensure compliance with regulatory requirements.
                                                                           Considering the aforementioned risks, it can be
Google Cloud KMS (Key Management Service) is a cloud                   concluded that secret management platforms such as AWS
service for centralized encryption key management provided             Key Management Service (KMS), Azure Key Vault, and
within the Google Cloud ecosystem. It allows businesses to             Google Cloud Key Management Service (KMS) are key
create, use, and manage cryptographic keys, as well as securely        tools for overcoming modern security challenges in cloud
perform cryptographic operations for other Google cloud                environments. They provide integrated, scalable, and
services. The primary purpose of Google Cloud KMS is to                reliable solutions for managing cryptographic keys and
enable organizations to control the process of data encryption         other sensitive data, helping organizations minimize the
and key management within the cloud infrastructure [20].               risks associated with storing secrets in the cloud [23].
    By default, all data stored in Google Cloud is                         However, even with these tools, organizations remain
automatically encrypted. Using Google Cloud KMS, users                 vulnerable to the risks mentioned above:
gain greater control over how their data is encrypted at rest
and how encryption keys are managed. This service                          1.   Vulnerability to Unauthorized Access: All
provides a high level of security and scalability, meeting the                  three platforms store critical keys and secrets in
needs of various industries and types of software. Google                       the cloud, which potentially exposes them to
Cloud KMS allows you to create and use keys for encrypting                      unauthorized access, including data breaches or
data in cloud services and applications, ensuring their                         cyber-attacks. AWS KMS, Azure Key Vault, and
protection both during storage and transmission.                                Google Cloud KMS implement appropriate
    The Google Cloud KMS platform offers centralized                            security measures, such as using Hardware
management of cryptographic keys for both direct use and                        Security Modules (HSMs) and advanced
integration with other cloud resources and applications. It                     encryption methods, but the risk persists,
supports various key sources for encryption:                                    especially if authentication and access
                                                                                management processes are not properly
        Cloud KMS Software Keys: Allow flexible data                           configured.
         encryption using manageable symmetric or                          2.   Internal Threats: Insider threats, such as
         asymmetric keys.                                                       unauthorized actions by employees or contractors,
        Cloud Hardware Security Modules (HSMs):                                pose a significant risk to any cloud infrastructure.
         Used for secure storage and processing keys in                         All three platforms use various methods to
         environments with high security requirements.                          mitigate these risks: AWS KMS supports threshold
        Customer-Managed           Encryption        Keys                      cryptography to distribute access to keys, Azure
         (CMEK): Provide the option to select and use keys                      Key Vault implements role-based access control
         generated by Cloud KMS for other Google Cloud                          (Azure RBAC), and Google Cloud KMS uses
         services.                                                              centralized management and auditing capabilities
        Cloud External Key Manager (EKM): Allows                               to prevent unauthorized access.
         the use of external keys that are stored outside of               3.   Ensuring Data Integrity and Confidentiality:
         Google Cloud.                                                          Cloud data storage requires continuous assurance
        Customer-Supplied Encryption Keys (CSEK):                              of data integrity and confidentiality. While AWS
         Customers can use their encryption keys,                               KMS, Azure Key Vault, and Google Cloud KMS use
         maintaining full control over these keys [21].                         advanced encryption methods and access control


                                                                  75
         mechanisms, storing data on remote servers                   certificates. Vault provides a unified interface for managing
         creates a risk of data tampering or unauthorized             any secrets, offering strict access control and detailed audit
         modification.                                                logging [26].
    4.   Scalability and Performance: The scalability of                  This is particularly important in cases where API keys for
         cloud environments also presents certain security            external services or credentials for interacting in service-
         challenges. The use of decentralized encryption              oriented architectures are used extensively and across various
         solutions, as in the case of Google Cloud KMS, can           environments, complicating the understanding of who has
         efficiently handle large volumes of data but may             access to which secrets (Fig. 1).
         require additional resources to maintain security.
         Azure Key Vault and AWS KMS offer scaling                        1.   Authentication — The process by which a client
         solutions, but the risk of reduced performance                        provides information that allows Vault to
         when processing large amounts of data should be                       determine if the client is who it claims to be. After
         considered.                                                           successful authentication, a token is generated
    5.   Compliance and Building Trust: Implementing                           that is associated with a specific policy.
         reliable secret storage solutions is also associated             2.   Verification — Vault verifies the client using
         with the risk of non-compliance with regulatory                       external trusted sources, such as GitHub, LDAP,
         requirements, such as GDPR or HIPAA, which can                        AppRole, etc., which provides an additional layer
         lead to fines and reputational damage. All three                      of security.
         platforms offer tools to ensure compliance with                  3.   Authorization — The process of mapping the
         standards, but their effective use requires                           client to a security policy defined in Vault. A policy
         organizations to carefully configure security                         consists of a set of rules that determine which API
         policies and maintain constant monitoring [24].                       endpoints the client has access to with their token.
                                                                               Policies provide a declarative way to grant or
    Thus, AWS KMS, Azure Key Vault, and Google                                 restrict access to specific resources in the vault.
Cloud KMS offer effective tools for secret management and                 4.   Access — After successful authentication and
data protection in cloud environments but require proper                       authorization, Vault grants the client access to
configuration and continuous monitoring to minimize                            secrets, keys, and encryption capabilities based on
security risks. Implementing these solutions allows                            the policies associated with the client’s identifier.
organizations to reduce the risk of data breaches, prevent                     The client can use the issued token to perform
unauthorized access, ensure data integrity and                                 future operations [27].
confidentiality, and comply with regulatory requirements.
However, the success of these measures depends on the                     Thus, HashiCorp Vault demonstrates an example of a
level of integration with existing cloud services and the             universal secret management platform that integrates
specific needs of the business.                                       modern cryptographic methods and provides a flexible and
                                                                      scalable approach to data security. Such a platform allows the
4. Universal secret management                                        centralized management of secrets and ensures compatibility
                                                                      with various cloud environments and services, providing
   platform                                                           robust access control and auditing capabilities. This makes it
In modern cloud environments, the need for effective and              a crucial tool for organizations looking to enhance their data
reliable secret management is becoming increasingly                   security and meet modern information protection
important. Advanced cryptographic solutions, such as state-           requirements.
of-the-art algorithms, threshold cryptography, hybrid
automated security systems, server-based decentralized                4.1. Challenges and risks associated with
encryption,      DNA-based encryption, and hybrid                          secret management and the vault’s role
cryptography, provide robust mechanisms for protecting                     in addressing them
secrets in the cloud. However, to achieve effectiveness, it is
essential to have a universal secret management platform              Modern enterprises face numerous challenges and risks
capable of integrating these solutions and providing                  related to secret management, such as credentials, API keys,
flexible, scalable, and centralized management of keys and            passwords, and other confidential data.
other sensitive data [25].                                                 Diversity and Lack of Centralized Control: Most
    HashiCorp Vault is an example of such a secret                    organizations have credentials scattered across their
management and encryption system based on identity. Vault             environments: in plaintext within source code, configuration
provides encryption services that ensure secure access to             files, or even in emails. This creates significant challenges in
secrets using authentication and authorization methods to             tracking and controlling access, increasing the risk of
verify and restrict access. This tool allows the protection,          unauthorized data use. The dispersion of secrets complicates
storage, and management of secrets and other sensitive data           understanding who has access to which resources and
through various interfaces, such as a UI, CLI, or HTTP API. A         reduces organizations’ ability to respond promptly to security
secret is any information that requires strict access control,        incidents.
such as tokens, API keys, passwords, encryption keys, or




                                                                 76
Figure 1: Universal Secret Management Platform

Increased Risk of Malicious Attacks: Storing credentials                Dynamic Secrets: Vault can generate secrets on
in plaintext or vulnerable formats increases the likelihood              demand for specific systems, such as databases or
of their compromise by both internal and external attackers.             cloud services. For instance, if an application needs
In the event of a data breach or misuse of credentials, the              access to an S3 bucket, Vault creates an AWS key
consequences can be catastrophic, including data loss,                   pair with valid permissions and automatically
leakage of confidential information, and significant                     revokes them after the lease period expires,
financial losses.                                                        significantly reducing the risk of compromise.
    Inability to Manage the Secret Lifecycle: Without a                 Data Encryption: Vault provides the capability to
specialized solution, organizations often struggle to                    encrypt and decrypt data without storing it,
effectively manage the lifecycle of secrets, including                   allowing security teams to control encryption
generation, storage, updating, and revocation of credentials.            parameters while developers can store encrypted
This leads to the accumulation of outdated or compromised                data in secure locations, such as SQL databases,
data, increasing the organization’s vulnerability to attacks             without the need to create their encryption
[28].                                                                    methods [29].
    HashiCorp Vault was designed to address these issues                Lease and Renewal of Secrets: All secrets in
by providing a universal secret management platform that                 Vault are associated with leases. After the lease
centralizes credentials, ensures their protection, and offers            period expires, the secret is automatically revoked,
effective management tools. The core features of Vault aim               helping to avoid the storage of outdated or
to minimize risks associated with secret management as                   insecure credentials. Clients have the option to
follows:                                                                 extend the lease using built-in APIs for renewal.
                                                                        Revocation of Secrets: Vault has built-in support
        Secure Secret Storage: Vault allows the storage
                                                                         for revoking secrets, allowing the immediate
         of any secret keys and values by encrypting them
                                                                         invalidation of access to specific credentials or all
         before writing them to persistent storage. This
                                                                         secrets associated with a particular user or data
         ensures that even if unauthorized access to the raw
                                                                         type. This feature helps to quickly respond to
         storage occurs, the secrets remain protected as
                                                                         security incidents and prevents the further use of
         they cannot be read without appropriate access
                                                                         compromised data [30].
         rights.



                                                                77
Thus, HashiCorp Vault effectively addresses the                       and credential management, ensuring a secure and efficient
challenges     of    dispersion,    reduced      management           environment setup. Vault acts as a secret management
transparency, and increased attack risk by providing                  cluster, critical for automation tasks carried out with
centralized secret management, robust encryption, dynamic             Rundeck — a platform that integrates secrets into its tasks,
creation and revocation of credentials, and detailed audit            primarily through Ansible instructions [31].
logs. This makes it an essential tool for enterprises looking             Access to secrets in Vault is achieved through the
to enhance the security of their confidential data and protect        AppRole authentication method, which supports machine-
it from modern cyber threats.                                         to-machine authentication, providing secure access to
                                                                      secrets. This method allows the creation of roles with
4.2. Using HashiCorp Vault for automating                             specific policies that regulate access to secrets. Each role is
     cloud environments                                               associated with a RoleID and SecretID, used for
                                                                      authentication, ensuring that only authorized services, such
In the context of automating cloud resource provisioning,
                                                                      as Rundeck, have access to the needed secrets (Fig. 2).
HashiCorp Vault serves as a centralized platform for secret




Figure 2: Cloud Environments Management Automation

Most secret functions in this architecture are based on the           Vault and obtain the necessary secrets. These secrets are then
HashiCorp Vault Key/Value (KV) v2 mechanism, which                    used in Ansible playbooks, which are part of the task,
provides advanced capabilities for storing and managing               ensuring secure automation of various operations without
data. KV v2 supports secret version history, allowing the             exposing confidential information in task scripts. This setup
secure storage of multiple versions of a single secret and the        not only provides centralized and secure secret management
ability to revert to previous versions in case of accidental          but also automates credential handling, reducing the risk of
deletion or unwanted changes. Additionally, this                      human error and enhancing the efficiency of automation
mechanism includes metadata for each secret, aiding in                workflows [33].
better management and lifecycle control of the stored data,               In addition to static secrets, this system utilizes AWS
ensuring detailed access control, and audit logging                   dynamic secret management in HashiCorp Vault,
necessary for maintaining data integrity and confidentiality          allowing the automatic creation of temporary AWS
[32].                                                                 credentials (Fig. 3). This is particularly useful for tasks that
    In practice, when a task is launched on Rundeck, it uses          require modifications to the AWS cloud environment,
the provided RoleID and SecretID to authenticate with                 enhancing security and compliance. The AWS mechanism


                                                                 78
in Vault is configured to generate credentials with a limited         perform specific actions in AWS, minimizing the risk of
lifespan based on predefined roles, which determines the              excessive permissions and improving security by adhering
access level and permissions required to perform specific             to the principle of least privilege [34].
automation tasks. This ensures that credentials can only




Figure 3: Dynamic Secret Management Mechanism: AWS Example

When a task is initiated in Rundeck, it requests temporary            credentials, offering policy-based access management.
credentials from Vault. After authenticating the request using        Integration of Vault with automation platforms like
AppRole, Vault issues these credentials, which are then used          Rundeck and Ansible allows the automation of cloud
by Ansible playbooks for secure interaction with AWS                  resource provisioning while maintaining information
services. Once the task is completed or the set time expires,         confidentiality and reducing the risk of human error. The
these credentials are automatically revoked, significantly            use of dynamic creation of temporary credentials enhances
reducing the risk of unauthorized access and misuse of                security and compliance, adhering to the principle of least
resources. This dynamic credential management approach                privilege.
eliminates the need for long-term AWS keys, simplifies the                 Comparing different secret management platforms,
credential rotation and auditing processes, and greatly               such as AWS KMS, Azure Key Vault, and Google Cloud
enhances security and efficiency in cloud environments [35].          KMS highlights their importance in securing cloud
    Thus, using HashiCorp Vault for automating cloud                  environments but also underscores the need for specialized
resource management not only centralizes and secures                  solutions that allow effective integration with existing cloud
credentials but also significantly improves security by               infrastructures. Vault offers a universal approach,
automating authentication and access management                       combining advanced cryptographic methods, centralized
processes. This reduces the risk of human error and                   management, and dynamic credential management, making
enhances the effectiveness of automation tasks in cloud               it a crucial tool for protecting confidential information.
environments [35].                                                         Thus, using HashiCorp Vault as a universal secret
                                                                      management platform is an optimal solution for
5. Conclusions                                                        organizations seeking to enhance the security of their cloud
                                                                      environments, ensure regulatory compliance, and automate
In today’s era of increasing cloud technology usage,                  resource management. It not only minimizes risks
managing secrets and ensuring data security have become               associated with unauthorized access and data misuse but
critical tasks for organizations. Given the numerous                  also significantly improves the efficiency of processes in
challenges, such as the fragmentation of credentials, rising          modern dynamic infrastructures.
internal and external threats, the complexity of managing
the lifecycle of secrets, and the need to comply with
regulatory requirements, employing a universal secret
                                                                      References
management platform is essential.                                     [1]   R. Salecha, Security and Secrets Management. (2022).
     The research indicates that HashiCorp Vault is an                      10.1007/978-1-4842-8673-9_9.
effective solution for centralized secret management in               [2]   P. Skladannyi, et al., Improving the Security Policy of
cloud environments. Vault provides secure storage,                          the Distance Learning System based on the Zero Trust
encryption, dynamic creation, and automatic revocation of                   Concept, in: Cybersecurity Providing in Information


                                                                 79
       and Telecommunication Systems, vol. 3421 (2023) 97–            [16] T. Moore, et al., Encryption Methods and Key
       106.                                                                Management Services for Secure Cloud Computing: A
[3]    P. Somasundaram, Unified Secret Management Across                   Review (2023).
       Cloud Platforms: A Strategy for Secure Credential              [17] P. Raj, Continuous Integration for New Service
       Storage and Access, Int. J. Comput. Eng. Technol. 15                Deployment and Service Validation Script for Vault,
       (2024) 5–12.                                                        Int. J. Sci. Res. Eng. Manag. 08 (2024). doi:
[4]    O. Vakhula, I. Opirskyy, O. Mykhaylova, Research on                 10.55041/IJSREM35565.
       Security Challenges in Cloud Environments and                  [18] A. Satapathi, A. Mishra, Storing Function Secrets in
       Solutions based on the “Security-as-Code” Approach,                 Azure Key Vault, Hands-on Azure Functions with C#.
       Cybersecurity Providing in Information and                          Apress (2021) 263–287. doi: 10.1007/978-1-4842-7122-
       Telecommunication Systems II, vol. 3550 (2023) 55–69.               3_11.
[5]    S. Shevchenko, et al., Information Security Risk               [19] P. Borra, Impact and Innovations of Azure IoT:
       Management using Cognitive Modeling, in:                            Current Applications, Services, and Future Directions,
       Workshop on Cybersecurity Providing in Information                  Int. J. Recent Technol. Eng. 13 (2024) 21–26. doi:
       and Telecommunication Systems II, CPITS-II, vol.                    10.35940/ijrte.B8111.13020724.
       3550 (2023) 297–305.                                           [20] R. Sajid, et al., Interpretation on the Google Cloud
[6]    V. Bysani, Automation in Cloud Infrastructure                       Platform and Its Wide Cloud Services. International
       Management: Enhancing Efficiency and Reliability,                   Journal of Security and Privacy in Pervasive
       Int. J. Sci. Res. Eng. Manag. 08 (2024). doi:                       Computing, 14 (2022) 1–7. doi: 10.4018/IJSPPC.313586.
       10.55041/IJSREM35750.                                          [21] P. Munyao, R. Chikoore, Impact of Cloud Solutions in
[7]    P. Raj, Continuous Integration for New Service                      Research Data Management, Scalable Computing and
       Deployment and Service Validation Script for Vault,                 Collaborative          Projects      (2024).        doi:
       Int. J. Sci. Res. Eng. Manag. (2024). doi:                          10.13140/RG.2.2.22876.40322.
       10.55041/IJSREM35565.                                          [22] A. Kamaraju, A. Ali, R. Deepak, Best Practices for
[8]    R. Banakh, A. Piskozub, Y. Stefinko, External                       Cloud Data Protection and Key Management, Future
       Elements of Honeypot for Wireless Network, in: 13th                 Technologies Conference (FTC) 3 (2022). doi:
       International Conference on Modern Problems of                      10.1007/978-3-030-89912-7_10.
       Radio Engineering, Telecommunications and                      [23] N. Golovacheva, M. Romanov, Study of Security
       Computer Science (TCSET) (2016) 480–482. doi:                       Mechanisms Cloud Services, NBI Technologies (2023)
       10.1109/TCSET.2016.7452093.                                         25–31. doi: 10.15688/NBIT.jvolsu.2023.3.3.
[9]    R. Kyrychok, et al., Development of a Method for               [24] S. Sarkar,       S. Roychowdhury,       Authentication
       Checking Vulnerabilities of a Corporate Network                     Authorization and Security Issues in Cloud
       using Bernstein Transformations, Eastern-European                   Computing, Int. J. Res. Appl. Sci. Eng. Technol. 11
       Journal of Enterprise Technologies, vol. 1, no. 9(115)              (2023) 1275–1283. doi: 10.22214/ijraset.2023.56670.
       (2022) 93–101. doi: 10.15587/1729-4061.2022.253530.            [25] P. Somasundaram, Unified Secret Management Across
[10]   V. Astapenya, et al., Conflict Model of Radio                       Cloud Platforms: A Strategy for Secure Credential
       Engineering Systems under the Threat of Electronic                  Storage and Access, Int. J. Comput. Eng. Technol. 15
       Warfare, in: Workshop on Cybersecurity Providing in                 (2024) 5–12.
       Information and Telecommunication Systems, CPITS,              [26] S. Ibn El Ahrache, H. Badir, Enhancing Cloud Data
       vol. 3654 (2024) 290–300.                                           Security Through Long-Term Secret Sharing Schemes
[11]   J. Chandra, Authentication and Authorization                        (2024). 10.21203/rs.3.rs-4770590/v1.
       Mechanism for Cloud Security, Int. J. Eng. Adv.                [27] J. Moazzam, Cloud Computing Security: AWS Data
       Technol. 8 (2019). 10.35940/ijeat.F8473.088619.                     Security Credentials, Studies in Indian Place Names
[12]   A. S. George, S. Fernando, Securing Cloud Application               (UGC Care Journal) 40 (2020).
       Infrastructure: Understanding the Penetration Testing          [28] P. Somasundaram, Unified Secret Management Across
       Challenges of IaaS, PaaS, and SaaS Environments.                    Cloud Platforms: A Strategy for Secure Credential
       Partners Universal Int. Res. J. 02 (2023) 24–34. doi:               Storage and Access, Int. J. Comput. Eng. Technol. 15
       10.5281/zenodo.7723187.                                             (2024) 5–12.
[13]   P. Kankwende, Cybersecurity_in_the Modern Age                  [29] A. Horpenyuk, I. Opirskyy, P. Vorobets, Analysis of
       Protecting Digital Assets, J. Sci. Eng. Res. 15 (2024).             Problems and Prospects of Implementation of Post-
[14]   S. T. Makani, Deep Dive into Terraform for Efficient                Quantum Cryptographic Algorithms, in: Classic,
       Management of AWS Cloud Infrastructure and                          Quantum, and Post-Quantum Cryptography, vol. 3504
       Serverless Deployment, Int. J. Comput Tech. 8(6)                    39–49.
       (2021).                                                        [30] S. Nashkova, Addressing Criminal Liability for Misuse
[15]   J. Almeida, et al., A Machine-Checked Proof of                      of Trade Secrets Under Australian Law: Is the Current
       Security for AWS Key Management Service, CCS '19:                   Legal Framework Adequate to Protect the Interests of
       Proceedings of the 2019 ACM SIGSAC Conference on                    Owners of Trade Secrets?, IIC – International Review
       Computer and Communications Security (2019) 63–                     of Intellectual Property and Competition Law, 55
       78. doi: 10.1145/3319535.3354228.                                   (2024) 1281–1315. doi: 10.1007/s40319-024-01490-4.
                                                                      [31] Y. Martseniuk, et al., Automated Conformity
                                                                           Verification Concept for Cloud Security, in:



                                                                 80
       Cybersecurity Providing in Information and
       Telecommunication, vol. 3654 (2024) 25–37.
[32]   J. Chandra,       S. K. Pasupuleti,    C. Narasimham,
       Authentication, Authorization and Auditing in Need
       of Internet of Things and Industry 4.0 for the Cloud
       Data Security, Authentication and Access Control for
       Secure Communication in Mobile Cloud Computing
       (2020) 70–81.
[33]   V. Susukailo, I. Opirsky, O. Yaremko, Methodology of
       ISMS Establishment Against Modern Cybersecurity
       Threats, Future Intent-Based Networking, LNEE 831
       (2022). doi: 10.1007/978-3-030-92435-5_15.
[34]   R. Sajjan, V. Ghorpade, M. Dhange, Multi-factor
       Authentication as a Service for Cloud Data Security,
       Int. J. Comput. Sci. Eng. 4(4) (2016).
[35]   K. R. Muppa, Advancing Cloud Security with AI-
       Enhanced AWS Identity and Access Management, Int.
       Res. J. Eng. Appl. Sci. (2022) 25–28. doi:
       10.55083/irjeas.2022.v10i01005.




                                                               81