An application is trying to use a dynamic secret in which the lease has expired. What can be done in order for the application to successfully request data from Vault?
Comprehensive and Detailed in Depth
Once a dynamic secret's lease expires, it cannot be renewed or reused; a new secret must be requested. The HashiCorp Vault documentation states: 'A lease must be renewed before it has expired. Once it has expired, it is permanently revoked and a new secret must be requested.' This means that after expiration, the secret is invalidated, and the application must obtain a new secret with a new lease to regain access.
Trying an expired secret (A) is futile as it's revoked. Performing a lease renewal (B) is impossible post-expiration, as the docs note: 'Renewal must occur before the lease expires.' Extending the TTL (D) isn't an option for an expired lease. Thus, C is the correct action.
HashiCorp Vault Documentation - Leases: Lease Renew and Revoke
All Vault instances, or clusters, include two built-in policies that are created automatically. Choose the two policies below and the correct information regarding each policy. (Select two)
Comprehensive and Detailed In-Depth
Vault automatically creates two built-in policies: root and default.
A: The root policy is created at initialization, granting superuser privileges (full access to all paths and operations). It's attached to root tokens and cannot be deleted or modified, per the policies documentation.
C: The default policy is also created automatically, providing basic permissions (e.g., token management). It's attached to all non-root tokens by default, can be modified, but cannot be deleted, as stated in the docs.
B: No admin policy is automatically created; administrative policies must be defined manually.
D: The default policy can be modified, contradicting this option.
Built-in Policies
Your organization operates active/active applications across multiple data centers for high availability. Which Vault feature should be used in the secondary data centers to provide local access to secrets?
Comprehensive and Detailed In-Depth
For active/active setups:
D . Performance replication cluster: 'Should be used in an active/active scenario to ensure applications in both data centers can easily access Vault secrets.'
Incorrect Options:
A: Scales single cluster, not multi-DC.
B, C: Not suited for local access.
Which of the following Vault policies will allow a Vault client to read a secret stored at secrets/applications/app01/api_key?
Comprehensive and Detailed in Depth
This question requires identifying a policy that permits reading the secret at secrets/applications/app01/api_key. Vault policies use paths and capabilities to control access. Let's evaluate:
A: path 'secrets/applications/' { capabilities = ['read'] allowed_parameters = { 'certificate' = [] } }
This policy allows reading at secrets/applications/, but not deeper paths like secrets/applications/app01/api_key. The allowed_parameters restriction is irrelevant for reading secrets. Incorrect.
B: path 'secrets/*' { capabilities = ['list'] }
The list capability allows listing secrets under secrets/, but not reading their contents. Reading requires the read capability. Incorrect.
C: path 'secrets/applications/+/api_*' { capabilities = ['read'] }
The + wildcard matches one segment (e.g., app01), and api_* matches api_key. This policy grants read access to secrets/applications/app01/api_key. Correct.
D: path 'secrets/applications/app01/api_key/*' { capabilities = ['update', 'list', 'read'] }
This policy applies to subpaths under api_key/, not the exact path api_key. It includes read, but the path mismatch makes it incorrect for this specific secret.
Overall Explanation from Vault Docs:
''Wildcards (*, +) allow flexible path matching... read capability is required to retrieve secret data.'' Option C uses globbing to precisely target the required path.
True or False? All Vault policies are deny by default.
Comprehensive and Detailed in Depth
The statement is True. Vault operates on a default-deny model for policies. The HashiCorp Vault documentation states: 'Vault policies implicitly deny all actions that are not explicitly permitted in the Vault policy.' This ensures that access must be explicitly granted, enhancing security.
The docs elaborate: 'By default, a token has no policies attached beyond the default policy (which grants minimal permissions), and any action not explicitly allowed by an attached policy is denied.' This principle underpins Vault's access control, making A correct.
HashiCorp Vault Documentation - Policies Tutorial
Selma
4 days agoMary
12 days agoBilly
19 days agoTimothy
27 days agoDesmond
1 month agoHorace
1 month agoBrinda
2 months agoViola
2 months agoFiliberto
2 months agoJustine
2 months agoYoko
3 months agoNoemi
3 months agoCory
3 months agoJovita
3 months agoErinn
4 months agoFlorinda
4 months agoKathrine
4 months agoBok
4 months agoGlory
5 months agoLynna
5 months agoLawrence
5 months agoDesmond
5 months agoDewitt
6 months agoAileen
6 months agoMarlon
6 months agoShonda
6 months agoFletcher
6 months agoEloisa
6 months agoEdna
7 months agoAmos
7 months agoDominga
7 months agoEliz
9 months agoCorinne
9 months agoAlaine
9 months agoMalcolm
10 months agoAnnice
10 months agoHubert
11 months agoLizbeth
11 months agoAmie
12 months agoRolland
1 year agoKristeen
1 year agoDella
1 year ago