diff --git a/website/source/intro/vs/consul.html.md b/website/source/intro/vs/consul.html.md deleted file mode 100644 index b12fe8066..000000000 --- a/website/source/intro/vs/consul.html.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -layout: "intro" -page_title: "Nomad vs. Consul" -sidebar_current: "vs-other-consul" -description: |- - Comparison between Nomad and attempting to store secrets with Consul. ---- - -# Nomad vs. Consul - -[Consul](https://consul.io) is system for service discovery, monitoring, -and configuration that is distributed and highly available. Consul also -supports an ACL system to restrict access to keys and service information. - -While Consul can be used to store secret information and gate access using -ACLs, it is not designed for that purpose. As such, data is not encrypted -in transit nor at rest, it does not have pluggable authentication mechanisms, -and there is no per-request auditing mechanism. - -Nomad is designed from the ground up as a secret management solution. As such, -it protects secrets in transit and at rest. It provides multiple authentication -and audit logging mechanisms. Dynamic secret generation allows Nomad to avoid -providing clients with root privileges to underlying systems and makes -it possible to do key rolling and revocation. - -The strength of Consul is that it is fault tolerant and highly scalable. -By using Consul as a backend to Nomad, you get the best of both. Consul -is used for durable storage of encrypted data at rest and provides coordination -so that Nomad can be highly available and fault tolerant. Nomad provides -the higher level policy management, secret leasing, audit logging, and automatic -revocation. - diff --git a/website/source/intro/vs/dropbox.html.md b/website/source/intro/vs/dropbox.html.md deleted file mode 100644 index 1d66d330e..000000000 --- a/website/source/intro/vs/dropbox.html.md +++ /dev/null @@ -1,25 +0,0 @@ ---- -layout: "intro" -page_title: "Nomad vs. Dropbox" -sidebar_current: "vs-other-dropbox" -description: |- - Comparison between Nomad and attempting to store secrets with Dropbox. ---- - -# Nomad vs. Dropbox - -It is an unfortunate truth that many organizations, big and small, -often use Dropbox as a mechanism for storing secrets. It is so common -that we've decided to make a special section for it instead of throwing -it under the "custom solutions" header. - -Dropbox is not made for storing secrets. Even if you're using something -such as an encrypted disk image within Dropbox, it is subpar versus a -real secret storage server. - -A real secret management tool such as Nomad has a stronger security -model, integrates with many different authentication services, stores -audit logs, can generate dynamic secrets, and more. - -And, due to `vault` CLI, using `vault` on a developer machine is -simple! diff --git a/website/source/intro/vs/hsm.html.md b/website/source/intro/vs/hsm.html.md deleted file mode 100644 index adc130b63..000000000 --- a/website/source/intro/vs/hsm.html.md +++ /dev/null @@ -1,39 +0,0 @@ ---- -layout: "intro" -page_title: "Nomad vs. HSMs" -sidebar_current: "vs-other-hsm" -description: |- - Comparison between Nomad and HSM systems. ---- - -# Nomad vs. HSMs - -A [hardware security module (HSM)](http://en.wikipedia.org/wiki/Hardware_security_module) -is a hardware device that is meant to secure various secrets. They generally -have very strong security models and adhere to many compliance regulations. - -The primary issue with HSMs is that they are expensive and not very -cloud friendly. Amazon provides CloudHSM, but the minimum price point to -even begin using CloudHSM is in the thousands of US dollars. - -Once an HSM is up and running, configuring it is generally very tedious, -and the "API" to request secrets is also difficult to use. Example: CloudHSM -requires SSH and setting up various keypairs manually. It is difficult to -automate. - -Nomad **doesn't replace an HSM**. There are many benefits to an HSM if -you can afford it. Instead, an HSM is a fantastic potential secret backend -for Nomad. This would allow Nomad to access the HSM data via the Nomad API, -making it significantly easier to use an HSM, while also retaining all the -audit logs. In fact, you'd have multiple audit logs: requests to Nomad -as well as to the HSM. - -Nomad can also do many things that HSMs cannot currently do, such -as generating _dynamic secrets_. Instead of storing AWS access keys directly -within Nomad, Nomad can generate access keys according to a specific -policy on the fly. Nomad has the potential of doing this for any -system through its mountable secret backend system. - -For most companies, an HSM is overkill, and Nomad is enough. For companies -that can afford an HSM, it can be used with Nomad to get the best of both -worlds. diff --git a/website/source/intro/vs/index.html.markdown b/website/source/intro/vs/index.html.markdown index d4435251a..2dfd894e2 100644 --- a/website/source/intro/vs/index.html.markdown +++ b/website/source/intro/vs/index.html.markdown @@ -3,19 +3,20 @@ layout: "intro" page_title: "Nomad vs. Other Software" sidebar_current: "vs-other" description: |- - Comparisons between Nomad and other software that claim to store secrets in some capacity. + Comparisons between Nomad and other cluster managers. --- # Nomad vs. Other Software -There are a number of other options in the market currently that claim -to store secrets in some capacity. This section compares Nomad to these -other software choices. +Nomad is a cluster manager and scheduler. There are many related categories +including cluster managers, resource managers, workload managers, and schedulers. +There are many existing tools in each category, and the comparisons are not exhaustive +of the entire space. Due to the bias of the comparisons being on the Nomad website, we attempt to only use facts. If you find something that is invalid or out of date in the comparisons, please -[open an issue](https://github.com/hashicorp/vault/issues) and we'll +[open an issue](https://github.com/hashicorp/nomad/issues) and we'll address it as soon as possible. Use the navigation on the left to read comparisons of Nomad versus other diff --git a/website/source/intro/vs/keywhiz.html.md b/website/source/intro/vs/keywhiz.html.md deleted file mode 100644 index 8621c23bb..000000000 --- a/website/source/intro/vs/keywhiz.html.md +++ /dev/null @@ -1,46 +0,0 @@ ---- -layout: "intro" -page_title: "Nomad vs. Keywhiz" -sidebar_current: "vs-other-keywhiz" -description: |- - Comparison between Nomad and Keywhiz. ---- - -# Nomad vs. Keywhiz - -Keywhiz is a secret management solution built by Square. Keywhiz -has a client/server architecture based on a RESTful API. Clients of -Keywhiz access secrets through the API by authenticating with a client -certificate or cookie. To allow for flexible consumption of secrets by arbitrary -software, clients may also make use of a FUSE filesystem to expose secrets -as files on disk, and use Unix file permissions for access control. Human -operators may authenticate using a cookie-based authentication either via command -line utilities or through a management web interface. - -Nomad similarly is designed as a comprehensive secret management -solution. The client interaction with Nomad is flexible -both for authentication and usage of secrets. Nomad supports [mTLS -authentication](/docs/auth/cert.html) along with many [other -mechanisms](/docs/auth/index.html). The goal being to make it easy to -authenticate as a machine for programmatic access and as a human for -operator usage. - -Nomad and Keywhiz expose secrets via an API. The Nomad -[ACL system](/docs/concepts/policies.html) is used -to protect secrets and gate access, similarly to the -Keywhiz ACL system. With Nomad, All auditing is done -server side using [audit backends](/docs/audit/index.html). - -Keywhiz focuses on storage and distribution of secrets and supports -rotation through secret versioning, which is possible in the Keywhiz UI and -command-line utilities. Nomad also supports dynamic secrets and generating credentials -on-demand for fine-grained security controls, but adds first class support -for non-repudiation. Key rotation is a first class concern for Keywhiz and Nomad, so -that no external systems need to be used. - -Lastly Nomad forces a mandatory lease contract with clients. All secrets read -from Nomad have an associated lease which enables operators to audit key usage, -perform key rolling, and ensure automatic revocation. Nomad provides multiple -revocation mechanisms to give operators a clear "break glass" procedure after -a potential compromise. - diff --git a/website/source/intro/vs/kms.html.md b/website/source/intro/vs/kms.html.md deleted file mode 100644 index 8b0cc7011..000000000 --- a/website/source/intro/vs/kms.html.md +++ /dev/null @@ -1,40 +0,0 @@ ---- -layout: "intro" -page_title: "Nomad vs. Amazon Key Management Service" -sidebar_current: "vs-other-kms" -description: |- - Comparison between Nomad and Amazon Key Management Service. ---- - -# Nomad vs. Amazon KMS - -Amazon Key Management Service (KMS) is a service provided in the AWS -ecosystem for encryption key management. It is backed by Hardware Security -Modules (HSM) for physical security. - -Nomad and KMS differ in the scope of problems they are trying to solve. -The KMS service is focused on securely storing encryption keys and supporting -cryptographic operations (encrypt and decrypt) using those keys. It supports -access controls and auditing as well. - -In contrast, Nomad provides a comprehensive secret management solution. -The [`transit` backend](/docs/secrets/transit/index.html) -provides similar capabilities as the KMS service, allowing for encryption keys -to be stored and cryptographic operations to be performed. However, Nomad goes -much futher than just key management. - -The flexible secret backends allow Nomad to handle any type of secret data, -including database credentials, API keys, PKI keys, and encryption keys. -Nomad also supports dynamic secrets, generating credentials on-demand for -fine-grained security controls, auditing, and non-repudiation. - -Lastly Nomad forces a mandatory lease contract with clients. All secrets read -from Nomad have an associated lease which enables operations to audit key usage, -perform key rolling, and ensure automatic revocation. Nomad provides multiple -revocation mechansims to give operators a clear "break glass" procedure after -a potential compromise. - -Nomad is an open source tool that can be deployed to any environment, -and does not require any special hardware. This makes it well suited for cloud -environments where HSMs are not available or are cost prohibitive. - diff --git a/website/source/layouts/intro.erb b/website/source/layouts/intro.erb index c0a15d064..7dce7ed64 100644 --- a/website/source/layouts/intro.erb +++ b/website/source/layouts/intro.erb @@ -17,26 +17,6 @@ Chef, Puppet, etc. -