diff --git a/changelog/12684.txt b/changelog/12684.txt new file mode 100644 index 0000000000..7abf3d43d2 --- /dev/null +++ b/changelog/12684.txt @@ -0,0 +1,3 @@ +```release-note:bug +Doc: Expanded the description of "What is Vault?" to align with CSA team's content. +``` diff --git a/website/content/docs/what-is-vault.mdx b/website/content/docs/what-is-vault.mdx index df2ed4cfcd..cd61832520 100644 --- a/website/content/docs/what-is-vault.mdx +++ b/website/content/docs/what-is-vault.mdx @@ -11,7 +11,22 @@ description: >- HashiCorp Vault is an identity-based secrets and encryption management system. A _secret_ is anything that you want to tightly control access to, such as API encryption keys, passwords, and certificates. Vault provides encryption services that are gated by authentication and authorization methods. Using Vault’s UI, CLI, or HTTP API, access to secrets and other sensitive data can be securely stored and managed, tightly controlled (restricted), and auditable. -A modern system requires access to a multitude of secrets, including database credentials, +If you are already familiar with the basics of Vault, the +[documentation](/vault/docs) provides a better reference guide for all +available features as well as internals. + +## What is Vault? + +HashiCorp Vault is an identity-based secrets and encryption management system. +It provides encryption services that are gated by authentication and authorization +methods to ensure secure, auditable and restricted access to _secrets_. +It is used to secure, store and protect secrets and other sensitive data using a UI, CLI, or HTTP API. + +A secret is anything that you +want to tightly control access to, such as tokens, API keys, passwords, encryption keys or certificates. +Vault provides a unified interface to any secret, while providing tight access +control and recording a detailed audit log. + API keys for external services, credentials for service-oriented architecture communication, etc. It can be difficult to understand who is accessing which secrets, especially since this can be platform-specific. Adding on key rolling, secure storage, and detailed audit logs is almost impossible without a custom solution. This is