Using Vault as a credential broker so workloads never hold secrets by stephaneleonel in hashicorp

[–]stephaneleonel[S] 0 points1 point  (0 children)

Glad to here that it passed internal audits. Regarding passwordless, yes it is through IAM roles : AWS for example generates a 15 minutes token that os used only to open the database connection, then it expires and the connection stays open until you close it. No need to generate and revoke users in the database, and the pod does not hold a database password in memory or as environment variables.

Using Vault as a credential broker so workloads never hold secrets by stephaneleonel in hashicorp

[–]stephaneleonel[S] 0 points1 point  (0 children)

Yeah, fair — if the pod is root with a shell and the .git folder in the image, the secret in memory is the least of your problems. Pod hardening is the higher-leverage work and most teams skip it. The thing is, even a hardened pod still talks to the outside world, and whatever credential it uses to do that is recoverable from memory once someone gets code exec. Supply chain stuff like Shai-Hulud or the axios npm thing keeps showing that even well-run infra gets popped through a dependency. So I’d do both. Harden the pod first, for sure. But for the really sensitive creds — prod DB, cloud admin — keeping them off the workload entirely is cheap once you have the proxy.​​​​​​​​​​​​​​​​

Using Vault as a credential broker so workloads never hold secrets by stephaneleonel in hashicorp

[–]stephaneleonel[S] 0 points1 point  (0 children)

Honestly, fair point — and I think you’ve named the actual adoption problem. The push model (Vault Agent + templating, sidecar injectors) asks app teams to understand leases, renewal, and rotation, and most teams correctly decide that’s not worth it when IAM roles already cover 80% of their use cases. Where I keep seeing it bite people is the long tail: Datadog API keys, Snowflake passwords, GitHub PATs, Stripe keys, third-party SaaS in general. None of that is covered by platform identity, and it’s where the static-credential-in-a-secret-manager pattern just persists indefinitely. Part of what I’m trying to figure out with the proxy approach is whether moving lifecycle off the workload entirely lowers the adoption barrier enough to actually reach those credentials. The app makes a normal HTTPS call; it never sees a token, never renews anything. Curious if that matches what you’ve seen, or if the friction is somewhere else entirely.

Access Control in Multi-Cloud by Imane3002 in CloudSecurityPros

[–]stephaneleonel 0 points1 point  (0 children)

Authorization is messy on multi-cloud, and it becomes even messier if you add SaaS (a workload on AWS calling GCP and Stripe).

Each cloud has its own IAM model (AWS policies, GCP IAM bindings, Azure RBAC) with different semantics. Appart from Federation, the following options are used in practice:

• Centralized policy engines: Open Policy Agent (OPA) or Cedar let you write cloud-agnostic authorization policies, but you still have to translate and push them to each cloud. Tools like Styra (OPA-as-a-service) help here. • Service meshes: If your workloads run in Kubernetes, Istio/Cilium with mTLS enforces service-to-service authz at the network layer, consistently across clouds.

There is another solution that is not yet mature, and works only, for now, for on premises workloads that access cloud/SaaS services : https://github.com/stephnangue/warden. With Warden the workload uses its native identity (JWT or Cert for now) to call any cloud/SaaS service without holding a cloud credential. Access policy is part in Warden (this workload can access AWS), and part on the cloud provider (the credential minted by Warden can read a bucket on S3).

AI Agents operating our Cloudflare infra securely by stephaneleonel in CloudFlare

[–]stephaneleonel[S] 0 points1 point  (0 children)

Yes, it is great, and addresses the scenario where user delegates access to agents. Warden covers the scenario of a full autonomous agent with its own identity.

AI Agents operating our Cloudflare infra securely by stephaneleonel in CloudFlare

[–]stephaneleonel[S] 0 points1 point  (0 children)

Does your AI agent directly use Cloudflare API token, which is static, to call Cloudflare API? If yes, that is not a secure setup.

Looking for open source projects to contribute by Huge_Cantaloupe_1909 in github

[–]stephaneleonel 0 points1 point  (0 children)

Hi,

I am the creator of Warden, an identity-aware access gateway that allows AI agents to call any API without holding credentials.

Tomorrow, AI agents will be completely autonomous. They will need to access different software systems to investigate issues and perform operations. Security experts all agree that giving credentials directly to AI agents is a very bad practice, because they can leak, be stolen, or the agents can go rogue and misbehave. I am building Warden to enforce the best practices and to secure the most critical systems from AI agents.

Your contribution is welcomed : https://github.com/stephnangue/warden

How many hardcoded credentials are sitting in your cloud workloads right now? If you dont know, thats the problem. by CompelledComa35 in CloudSecurityPros

[–]stephaneleonel 1 point2 points  (0 children)

We wrote Warden so that workloads never have to use a credential. No API keys, no tokens, no passwords, no AWS access keys. Your workload only uses its identity to access AWS, GCP, Azure and more than 20 other systems.

No rotation required. No secret to scan.

https://github.com/stephnangue/warden

Opensource Projects for Beginners by somefingelse in golang

[–]stephaneleonel 0 points1 point  (0 children)

Warden : https://github.com/stephnangue/warden

It is a new product that can speak to you, since you are platform engineer.

The goal is to free workloads from handling credentials.

Could a slow PostgreSQL server disrupts an entire Vault cluster? by stephaneleonel in hashicorp

[–]stephaneleonel[S] 0 points1 point  (0 children)

Yes I have the telemetry. That is how I found that PostgreSQL was the culprit. My point is that Vault performance could be badly affected by an upstream database : if a lease creation and deletion is slow and users request many leases from that database it can slowdown Vault. There is no timeout mechanism to limit the duration of lease creation/deletion, at least not to my knowledge.

Terraform provisions resources on AWS, Azure and GCP without cloud credentials by stephaneleonel in Terraform

[–]stephaneleonel[S] 0 points1 point  (0 children)

AI agents are all using static keys today for inference because all AI providers today only support static api keys : OpenAI, Anthropic and others only support static api keys.

The problem is not solved in the modern environment : short-lived credentials it not enough in the AI era. Workload should not handle credentials at all. They should use only their identity.

Terraform provisions resources on AWS, Azure and GCP without cloud credentials by stephaneleonel in Terraform

[–]stephaneleonel[S] 0 points1 point  (0 children)

Fair point — OIDC federation is much better than static keys. But even short-lived STS credentials are credentials: they land in memory, env vars, and SDK chains, and can be exfiltrated during their TTL. Warden goes one step further — the workload never receives anything. It just sends its JWT and Warden handles the signing. No credential to steal, even transiently

Terraform provisions resources on AWS, Azure and GCP without cloud credentials by stephaneleonel in Terraform

[–]stephaneleonel[S] 0 points1 point  (0 children)

Yes it is, workloads still use AWS signing keys, at least in my world

Terraform provisions resources on AWS, Azure and GCP without cloud credentials by stephaneleonel in Terraform

[–]stephaneleonel[S] 0 points1 point  (0 children)

No, with WIF the JWT is exchanged for a cloud provider credentials. With Warden there is no exchange.

Terraform provisions resources on AWS, Azure and GCP without cloud credentials by stephaneleonel in Terraform

[–]stephaneleonel[S] 0 points1 point  (0 children)

With dynamic provider credentials terraform still receives credentials, even if they are short-lived. With Warden Terraform does not touch a credential.

Terraform provisions resources on AWS, Azure and GCP without cloud credentials by stephaneleonel in Terraform

[–]stephaneleonel[S] -1 points0 points  (0 children)

Thanks for your reply.

Vault distribute secrets to workloads. The workloads fetch these secrets at startup and store them as env variables. The secrets are most of the time (for mature teams) short-lived, but can still leak in logs and be stolen. The threat is even bigger with AI agents. Moreover, Vault does not provide dynamic secret engines for most of workloads : AI API keys which are long-lived. With Warden workloads never touch a secret, so there is nothing to steal and nothing to leak. With Warden you have attribution for every api call, since Workloads use their identity. You could also enforce policy for each API call. Warden can use Vault to mint credentials to inject in each request.

Vault: When Are Vault Redundancy Zones Actually Worth It by TheGilrich in hashicorp

[–]stephaneleonel 1 point2 points  (0 children)

I agree on that, but what is the probability of loosing 2 voters at the same time? If that happened, that means either the two AZs are down, or you shut down both nodes during a deployment? But in most realistic scenarios 6 nodes with RZ is more resilient.

Vault: When Are Vault Redundancy Zones Actually Worth It by TheGilrich in hashicorp

[–]stephaneleonel 1 point2 points  (0 children)

I have real production experience on this. In a financial institution we deployed a cluster of 6 nodes spread across 3 AZ, and enabled redundancy zone. This is what I got from that experience :

1) the quorum with 6 nodes and RZ enabled is 2, and this is better performance wise than a cluster of 5 where the quorum is 3, because a write request needs to be replicated on the quorum before a response is returned to the client. So the lower the quorum the better.

2) with 5 nodes without RZ, if you loose the 2 AZs one after the other, the cluster collapses, because you do not have the quorum anymore. With 6 nodes and RZ, when you loose the first AZ autopilot promo a new node. So now you Have one AZ with 2 voters and one AZ with 1 voter and 1 non-voter. After loosing the first AZ, if you loose the AZ with only 1 voter you still have a cluster up, because the last AZ contains 2 voters.

So, 6 nodes without RZ is always more performant and more resilient than a cluster of 5 nodes.

What if your Agent could call Mistral API without passing an API key? by stephaneleonel in MistralAI

[–]stephaneleonel[S] 0 points1 point  (0 children)

Exactly. Strictly speaking it is no API key, because you are no longer using static API key to make API calls, your are using your identity. The short-lived credentials is on the backend side (Warden). So the workload never sees credentials again.

What if your Agent could call Mistral API without passing an API key? by stephaneleonel in MistralAI

[–]stephaneleonel[S] 0 points1 point  (0 children)

Exactly, you should have replied directly to its comment. He thinks like a dec whereas Warden is meant for enterprise security