Skip to content

Commit

Permalink
backport of commit 80ed7e5 (#13824)
Browse files Browse the repository at this point in the history
Co-authored-by: mickael e <[email protected]>
Co-authored-by: Loann Le <[email protected]>
  • Loading branch information
3 people authored Feb 4, 2022
1 parent cadf679 commit c865ef3
Showing 1 changed file with 8 additions and 1 deletion.
9 changes: 8 additions & 1 deletion website/content/docs/internals/security.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ The following are the various parts of the Vault threat model:

- Eavesdropping on any Vault communication. Client communication with Vault
should be secure from eavesdropping as well as communication from Vault to
its storage backend.
its storage backend or between Vault cluster nodes.

- Tampering with data at rest or in transit. Any tampering should be detectable
and cause Vault to abort processing of the transaction.
Expand Down Expand Up @@ -85,6 +85,13 @@ require that a client provides a client token for every request which is used
to identify the client. A client that does not provide their token is only
permitted to make login requests.

All server-to-server traffic between Vault instances within a cluster (i.e,
high availability, enterprise replication or integrated storage) uses
mutually-authenticated TLS to ensure the confidentiality and integrity of data
in transit. Nodes are authenticated prior to joining the cluster, by an
[unseal challenge](/docs/concepts/integrated-storage#vault-networking-recap) or
a [one-time-use activation token](/docs/enterprise/replication#security-model).

The storage backends used by Vault are also untrusted by design. Vault uses a
security barrier for all requests made to the backend. The security barrier
automatically encrypts all data leaving Vault using a 256-bit [Advanced
Expand Down

0 comments on commit c865ef3

Please sign in to comment.