»Security Overview

This living document describes a security overview HCP Vault. It reflects the current state of HCP Vault.

»Vault data

Vault's data is encrypted and stored in an account-specific Amazon Elastic Block Store (EBS) in the same region as the cluster.

»MSP policy

Hashicorp uses the Managed Service Provider (MSP) policy to perform updates on all HCP Vault Clusters. This policy allows us to manage and access policies required for HCP Vault Service where we may periodically add new management functionality. When an update takes place using this policy, a root token is generated, and is visible in the audit logs. Once the update is completed, the root token is destroyed. While you may see the hcp-metadata path appear in your audit logs, there are no actions required from you; please ignore the path.

»Snapshots

Snapshots are stored in HashiCorp managed, encrypted Amazon S3 buckets in the US. The colocation of snapshots in the same region as the Vault cluster is planned.

»Audit logs

Audit logs are stored in an encrypted Amazon S3 bucket in the same region as the cluster.

If desired, you can upload this data to your existing security information and event management (SIEM) platform. Future support of out-of-the box integration is planned.

»Root token

Cluster initialization generates a root token, used to enable initial authentication methods, define policies, and establish trust with the control plane. The root token is revoked after setup is complete.

»Cluster auto unseal

A unique Key Management Service (KMS) key is created for each Vault cluster. This KMS key is trusted by the EC2 instances that are backing the Vault cluster and configured to be used as the autounseal mechanism.

»Cluster hardening

Clusters adhere to our production hardening guidelines.

  • End-to-end TLS - Instances use LetsEncrypt certificates that are automatically rotated.

  • Single tenant, Vault dedicated clusters - Instances run only the Vault process and management subsystem. Vault instances are not shared between organizations.

  • Firewall restrictions only allow inbound TCP/8200 on the public and private IP address. Public IP usage is discouraged in production.

  • Disable SSH / Remote Desktop - Port 22 is disabled for all Vault clusters.

  • Disable swap - Swap space is permanently disabled on instances.

  • Don’t run as root - Vault processes run as a dedicated, non-root user account.

  • Turn off core dumps - Core dumps are disabled on instances.

  • Immutable upgrades - Immutable instances are used to upgrade Vault clusters; software packages are never upgraded in-place.

  • Avoid root tokens - The root token is used to initially configure the cluster and then revoked. It is never shared outside the cluster.

  • Enable auditing - Enabled by default on all production clusters. Audit logging is not available on Dev clusters.

  • Upgrade frequently - Monthly updates are performed for system packages. HCP automatically upgrades Vault minor version; however, major version upgrades are not automatic.

  • Configure SELinux / AppArmor - These are not in use.

  • Restrict storage access - All Vault data is encrypted and stored under the customer’s dedicated account. HashiCorp’s access to this account is restricted to support staff on a need-to-access basis. Customer secrets are not accessible to HashiCorp staff.

  • Disable shell command history - Not applicable as Vault commands are not issued.

  • Tweak ulimits - ulimits have been optimized for Vault usage.

  • Docker containers - Not applicable as Docker is not used.

  • No clear text credentials - All credentials are encrypted.

»System API endpoints

Most endpoints under /v1/sys that require authentication are not available. However, the following endpoints are available:

»Supported Auth Methods

The following authentication methods were demonstrated to function as intended with HCP Vault:

OIDC

There are some limitations to use AWS IAM, Google OIDC, and TLS certificates auth methods in HCP Vault. Refer to HCP Vault Constraints and Known Issues for more details and workarounds.

Additional auth methods are being validated with HCP Vault.

»Supported Secrets Engines

The following secrets engines were validated and shown to function as expected with HCP Vault:

Database

Validation of additional secrets engines with HCP Vault is planned.

»GDPR Data Processing Agreement

HashiCorp supports General Data Protection Reguration (GDPR) Data Processing Agreement (DPA) today for HCP Vault.

»HIPAA Business Associate Agreement

HIPAA Business Associate Contracts (BAAs) are not supported.