HashiCorp Cloud Platform
Secrets inventory reporting
Integrating Vault as your secrets management can increase security, and reduce operational overhead to protect sensitive data. However, it is critical to set the right permissions to control access to those data.
Vault secrets inventory reporting increases visibility into the secrets Vault manages through the UI and API. The reporting services use telemetry to collect and surface data about when secrets are being accessed, modified, and destroyed.
Enable secrets inventory reporting
Log into the HCP Portal.
Navigate to the HCP project you want to create an HCP Vault Dedicated cluster in.
Select Vault Dedicated, and click Create cluster and make your cluster selections.
Select the Enable reporting toggle button.

Click Create cluster.
Once the cluster is up and running, you can start storing secrets.
View secrets inventory report
The admin role has access to secrets inventory reporting. For non-admin users, you need the secrets inventory report reader role for Vault reporting service in addition to view the report.
In the HCP Portal, select Vault Dedicated.
Select Secrets Inventory.

You can filter the data using the quick filters. Also, you can order the
Last accessedandLast modifiedtimestamps in ascending or descending dates.
Available column data
You can select or deselect the column fields to display.

The table below lists available column fields and their description.
| Table Column | Description |
|---|---|
| Secret name | The secret key of the data. Type of secret can be static, dynamic, or auto-rotating. |
| Engine | Type of secrets engine (KV v1, KV v2, AWS, GCP, Azure, database, transit, etc.) |
| Namespace | The Vault namespace where the secrets created in. |
| Mount path | The path of the secrets engine or authentication method has enabled at. |
| Created | The timestamp of secret creation and entity ID of user who created the secret. |
| Last modified | The timestamp of when the secret was last modified, and the entity ID of who modified the secret such as changing the secret values, deleting or undeleting a secret. |
| Last accessed | The timestamp of when the secret was last accessed (read or used). |
| Versions | The version of the secrets associated with KV v2 secrets. |
| Next rotation | The next rotation date of the secret based on the rotation policy. |
| TTL | How long a secret remains valid based on time-to-live (TTL) policy. |
| Deleted | Deleted or destroyed secrets. |
Download secrets inventory report
You can export the secrets inventory report data with filters applied.
- From the Secrets Inventory page, click Export.
- Select the desired file format: JSON, or CSV.
- Click Continue.
- Click Download records, and select the download location.