CLOSE

HCP Vault -Hub and Spoke

1
An event triggers the instantiation of an AWS Lambda function. Upon bootstrap, the Vault AWS Lambda Extension makes a request to obtain secrets from a Vault deployment.
2
The request is an HTTPS API call on TCP port 8200 pointing to a well-known DNS name that represent the Vault deployment.
3
A local Router forwards the traffic to a Transit Gateway using an attachment. A Transit Gateway accepts attachments from AWS VPCs, AWS Direct Connect, WAN network devices, or VPN Connections.
4
The AWS Transit Gateway forwards traffic to the trusted HCP HVN attachment.
5
Upon receiving a service request, Vault uses its AWS Authentication Engine configuration to request validation of the callers identity. An account principal in the localized AWS Account AWS IAM vets the identity.
6
With a valid identity, Vault matches expressed policies that provide privileges to one or more secrets engines. The secrets engine provides a payload with the secrets material to the original caller.
7
The extension writes the secrets to a private location that is accessible in the Lambda Execution Environment and then signals for readiness.
8
The AWS Lambda runtime function reads the secrets and uses the payload for a front-end or back-end operation.