Vault

TAS Score: S3/3 – D3/5 – A3 / T2

Brief Description

Secure, encrypted storage for secrets, API keys, certificates, and other sensitive data. Provides fine‑grained access control, auditing, and dynamic secrets.


Architectural Role

Security layer: centralised secrets management and encryption as a service. Protects infrastructure credentials and ensures secure authentication.


Technical Autonomy

  • ✅ Works without internet (after setup; can run in air‑gapped mode)
  • ✅ Stores data locally (encrypted storage backend)
  • ✅ Does not require external accounts
  • ✅ Allows data export (backup of storage backend)
  • ✅ Provides offline updates (manual via packages)

Philosophical Assessment (whose.world criteria)

Criterion Status Comments
Pause Yes Vault service can be stopped; secrets remain encrypted.
Exit Yes Storage backend can be copied; no lock‑in.
Recoverability Yes Full recovery from storage backend backup.
Visibility Yes Open source, auditable.
External Dependencies Yes No required cloud services; can run entirely offline.

Configuration (Minimal)

Development server (for testing):

vault server -dev
For production, configure file storage backend (example config.hcl):

hcl
storage "file" {
  path = "/opt/vault/data"
}

listener "tcp" {
  address     = "127.0.0.1:8200"
  tls_disable = true
}

api_addr = "http://127.0.0.1:8200"
Start with: vault server -config=config.hcl

Alternatives

  • SOPS – simpler, file‑based, no API.

  • Sealed Secrets – Kubernetes‑specific.

  • Hashicorp Consul – includes key‑value store but not dedicated secrets.

Trajectory

Direction: closing.

In August 2023, HashiCorp changed the license of Vault (and all its products) from MPL‑2.0 to the Business Source License (BSL 1.1). BSL is not an OSI‑approved open‑source license — it prohibits using the software to offer competing commercial services.

This moved Vault from T2 (open source) toward T1 (documented but restricted). The source code is still publicly readable, but the usage rights are narrower. The community responded with OpenBao — an MPL‑2.0 fork maintained by the Linux Foundation.

In 2024, IBM acquired HashiCorp. The long‑term trajectory is uncertain, but the direction — from community‑governed open source to corporate‑controlled source‑available — is clear.

If you choose Vault today, have a migration path to OpenBao. If you’re starting fresh, evaluate OpenBao directly.

Sources


This site uses Just the Docs, a documentation theme for Jekyll.