1592217165-hashicorp-vault-enterprise-securing-vmware-data
1592217165-hashicorp-vault-enterprise-securing-vmware-data
June 2020
SECURING VMWARE DATA
Introduction
Vault allows you to secure, store and tightly control access to tokens, passwords, certificates,
encryption keys, and other sensitive data using a UI, CLI, or HTTP API. Vault recently completed
VMware product compatibility validation against vSphere 6.5 and 6.7 to satisfy our customers
requirements for certified solutions when using Vault and VMware.
You can increase productivity, control costs by reducing systems, licenses and overhead by
centrally managing all secrets operations. Vault can also assist with reducing the risk of breach
by eliminating static, hard-coded credentials by centralizing secrets.
The OASIS Key Management Interoperability Protocol (KMIP) standard is a widely adopted
protocol for handling cryptographic workloads and secrets management for enterprise
infrastructure such as databases, network storage, and virtual/physical servers.
When an organization has services and applications that need to perform cryptographic
operations (e.g. transparent database encryption, full disk encryption, etc), it often delegates the
key management task to an external provider via KMIP protocol. As a result, your organization
may have existing services or applications that implement KMIP or use wrapper clients with
libraries/drivers that implement KMIP. This makes it difficult for an organization to adopt the Vault
API in place of KMIP.
Solution
Vault Enterprise v1.2 introduced the KMIP secrets engine which allows Vault to act as a KMIP
server for clients that retrieve cryptographic keys for encrypting data via KMIP protocol.
Vault's KMIP secrets engine manages its own listener to service KMIP requests which operate
on KMIP managed objects. Vault policies do not come into play during these KMIP requests.
The KMIP secrets engine determines the set of KMIP operations the clients are allowed to
perform based on the roles that are applied to a TLS client certificate.
This enables existing systems to continue using the KMIP APIs instead of Vault APIs.
The process flow includes the KMS, the vCenter Server, and the ESXi host.
1. When the user performs an encryption task, for example, creating an encrypted virtual
machine, vCenter Server requests a new key from the default KMS. This key is used as
the Key Encryption Key (KEK).
2. vCenter Server stores the key ID and passes the key to the ESXi host. If the ESXi host is
part of a cluster, vCenter Server sends the KEK to each host in the cluster. The key itself
is not stored on the vCenter Server system. Only the key ID is known.
3. The ESXi host generates internal Data Encryption Keys (DEKs) for the virtual machine
and its disks. It keeps the internal keys in memory only, and uses the KEKs to encrypt
internal keys. Unencrypted internal keys are never stored on disk. Only encrypted data is
stored. Because the KEKs come from the KMS, the host continues to use the same
KEKs.
4. The ESXi host encrypts the virtual machine with the encrypted internal key. Any hosts
that have the KEK and that can access the encrypted key file can perform operations on
the encrypted virtual machine or disk.
vSphere Virtual Machine Encryption works with any supported storage type (NFS, iSCSI, Fiber
Channel, and so on), including VMware vSAN.
● Workflows, not Technologies: Request secrets for any system through one consistent,
audited, and secured workflow.
● Secure Multi-tenancy: Isolate different tenant environments for security and
compliance. Different teams and departments can work independently of each other and
have access to only their own keys and systems.
● HSM Support: Vault supports integration with any HSM that supports PKCS #11. Most
hardware-based KMIP Servers only support specific HSMs.
● Flexibility: Most key managers are hardware devices and difficult to procure, manage
and maintain. Vault gives you more flexibility as it is distributed as a binary and can be
deployed across multiple platforms.
● Cost and Efficiency: One deployment of Vault can create multiple independent KMIP
servers. Save time and cost as you don’t need to buy and manage hardware devices for
each department.
● Management: Vault is easy to manage and use, as it offers Web UI, CLI, and HTTP API
interfaces.
● High Availability: Built-in High Availability using Consul as the storage back-end. Using
Consul also provides automated registration, tagging, and health checks for Vault
services within Consul.
● Multi-datacenter replication: Built-in multi-datacenter replication for horizontal
scalability and disaster recovery use-cases.
● Audit Logging: With Vault’s audit log, monitoring secret access across multiple
environments and clouds is easy and automated.
● Future-proof: Vault comes power packed with multiple integrations like AWS, Azure,
GCP, Kubernetes, Databases, and more to provide a central service for secret and
certificate management, cryptographic and advanced data protection needs.
Summary
HashiCorp Vault Enterprise with KMIP Secret Engine is the perfect solution for protecting your
Data in virtual environments. The ease of deployment and configuration of Vault added to other
enterprise features like “Performance Replication”, “Disaster Recovery” and “HSM Integration”
provide to our customers the maximum level of Service and Security without compromise.
Additional Resources
● Securing VMware Data: A HashiCorp Vault KMIP Story
● KMIP Secrets Engine
● Learn - KMIP Secrets Engine
● KMIP Integration: The KMIP secrets engine allows Vault to act as a Key Management
Interoperability Protocol (KMIP) server provider and handle the lifecycle of its KMIP
managed objects. KMIP is a standardized protocol that allows services and applications
to perform cryptographic operations without having to manage cryptographic material,
otherwise known as managed objects, by delegating its storage and lifecycle to a key
management server.
● Transform: The Transform secrets engine handles secure data transformation and
tokenization against provided input value. Transformation methods may encompass
NIST vetted cryptographic standards such as format-preserving encryption (FPE) via
FF3-1, but can also be pseudonymous transformations of the data through other means,
such as masking.
Additional Resources
● Introducing the KMIP Server Secret Engine
● Vault Transform: Protecting Secrets in External Systems
● Learn: Using KMIP to Secure MongoDB and MySQL
● Learn: Secure Data Transformation Using Format Preserving Encryption
www.hashicorp.com
USA Headquarters