2015-03-13 17:34:29 +00:00
|
|
|
---
|
|
|
|
layout: "intro"
|
|
|
|
page_title: "Vault vs. Custom Solutions"
|
|
|
|
sidebar_current: "vs-other-custom"
|
|
|
|
description: |-
|
2015-04-11 02:39:17 +00:00
|
|
|
Comparison between Vault and writing a custom solution.
|
2015-03-13 17:34:29 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Vault vs. Custom Solutions
|
|
|
|
|
2015-04-11 02:39:17 +00:00
|
|
|
Many organizations resort to custom solutions for storing secrets,
|
|
|
|
whether that be Dropbox, encrypted disk images, encrypted SQL columns,
|
|
|
|
etc.
|
2015-03-13 17:34:29 +00:00
|
|
|
|
2015-04-11 02:39:17 +00:00
|
|
|
These systems require time and resources to build and maintain.
|
|
|
|
Storing secrets is also an incredibly important piece of infrastructure
|
|
|
|
that must be done correctly. This increases the pressure to maintain
|
|
|
|
the internal systems.
|
2015-03-13 17:34:29 +00:00
|
|
|
|
2015-04-11 02:39:17 +00:00
|
|
|
Vault is designed for secret storage. It provides a simple interface
|
|
|
|
on top of a strong security model to meet your secret storage needs.
|
2015-03-13 17:34:29 +00:00
|
|
|
|
2015-04-11 02:39:17 +00:00
|
|
|
Furthermore, Vault is an open source tool. This means that the tool is
|
|
|
|
as good as the entire community working together to improve it. This
|
|
|
|
isn't just features and bug fixes, but finding potential security holes.
|
2016-05-19 07:01:30 +00:00
|
|
|
Additionally, since it is open source, your own security teams can
|
2015-04-11 02:39:17 +00:00
|
|
|
review and contribute to Vault and verify it meets your standards
|
|
|
|
for security.
|