Disclaimer: Although I am an IBMer, the opinions expressed here are purely my own and should never be considered official IBM statements.
As an integrator, I've spent my career in the trenches of enterprise IT. I’ve seen the catastrophic financial and reputational damage that happens when governance is just a checkbox—a policy document no one reads, a software-based "control" that a privileged admin can bypass.
Now, we are building Agentic AI—autonomous systems we intend to grant agency over our most critical processes. The industry is rushing headlong into this, armed with the same fragile, software-only governance models that have failed us time and again.
This is a recipe for disaster.
A software dashboard cannot govern a system when the underlying platform is untrusted. A log file is useless if the root user (or the cloud provider) can alter it. To govern autonomous AI, we must move from a weak "trust me" model (relying on software policy) to a powerful "prove it to me" model (relying on hardware proof).
This requires a Dual-Stack AI Governance model:
🛡️ The Foundational Trust Stack (The "Proof"): This is the hardware layer. It answers the question, "Is this compute environment actually secure?" It's built on Confidential Computing (CC) and Trusted Execution Environments (TEEs)—like Intel SGX/TDX and AMD SEV-SNP—which encrypt and isolate data while it's in use.1 Its primary mechanism is Attestation, the cryptographic process where a TEE proves its identity and integrity.6
⚙️ The Orchestration & Policy Stack (The "Policy"): This is the automation layer. It answers, "Is this environment configured correctly and operating as intended?" It's built on Infrastructure-as-Code (IaC) 10 and Policy-as-Code (PaC) 11 using tools like Terraform and Vault. Its mechanism is Automation.
Historically, these two stacks have lived in separate worlds—one managed by security and hardware teams, the other by DevOps. The critical governance "gap" is the lack of an automated, code-based bridge between them.
IBM's acquisition of HashiCorp is the key to finally bridging this gap. Vault and Terraform are the essential integration plane. They provide the ability to enforce a single, auditable policy that spans from the silicon to the application API. This is the blueprint for "Provable Governance."
1. Vault: The Central Pivot for Foundational Trust
HashiCorp Vault is more than a secrets manager 14; it is the active, identity-based security plane that enforces hardware-level trust.
For AI governance, Vault becomes the broker for an agent's "keys to the kingdom"—the API keys for watsonx, the encryption keys for training data, the credentials for proprietary data sources.
⚠️ A CRITICAL VULNERABILITY (AND IBM'S OPPORTUNITY)
Vault is a high-value target. Recent zero-day vulnerabilities 17 highlighted logical flaws that could allow privilege escalation or policy bypass. This proves that a software-based "keymaker" (Vault) is still vulnerable. It must be anchored in its own secure hardware environment—a unique, FIPS 140-2 Level 4 capability IBM can provide, which we'll explore in Section 4.
Attestation-Gated Secret Release: The Multi-Cloud "Bouncer"
Vault's extensible architecture allows it to function as the central "relying party" for TEE attestation across any cloud. This is "attestation-gated key release": an AI workload must prove its hardware and software integrity before Vault releases the secrets it needs to operate.
Intel SGX/TDX: A client in an SGX enclave sends its hardware-signed attestation "quote" to a Vault auth plugin. Vault validates this "golden measurement" (MRENCLAVE/MRSIGNER) to ensure it's the exact, unmodified AI model code before releasing secrets.6
AWS Nitro Enclaves: A Vault auth plugin can validate the COSE-signed attestation document from the enclave's Nitro Security Module (NSM), verifying its hardware integrity—a far stronger check than a simple IAM role.7
Azure CVMs (SEV-SNP/TDX): Vault's standard JWT/OIDC auth method can act as the relying party for Microsoft Azure Attestation (MAA). The CVM gets a signed JWT from MAA, presents it to Vault, and Vault validates the token's claims (e.g., "VM is trustworthy") before releasing secrets.24
GCP CVMs (SEV): A similar workflow is possible by configuring Vault's JWT/OIDC auth to validate attestation tokens from Google's attestation service.26
The Vault Agent 31 acts as a "sidecar" within the TEE, handling this entire auto-auth and attestation flow, automatically renewing tokens 33, and rendering secrets for the AI application, often without requiring any code changes.31
Table 1: Multi-Cloud TEE Attestation and Vault Integration
Provider/Technology | Attestation Mechanism | Attestation Report Format | Vault Integration Point |
Intel SGX/TDX | Direct Hardware Quote | SGX Quote + Collateral [6] | Custom Auth Plugin ( |
AWS Nitro Enclaves | Nitro Security Module (NSM) | COSE-signed document [21] | Custom AWS Auth Method (Nitro-specific) [8] |
Azure CVM (AMD SEV-SNP) | vTPM + Microsoft Azure Attestation (MAA) | TPM Quote 9 wrapped by MAA JWT 25 | Standard JWT/OIDC Auth Method (via MAA) 25 |
GCP CVM (AMD SEV) | vTPM + Google Attestation Service | GCP Attestation JWT 30 | Standard JWT/OIDC Auth Method 30 |
IBM Hyper Protect (IBM Z) | IBM Z Secure Enclave | Secure Build Contract 36 | PKCS#11 / GREP11 Auto-Unseal [36, 37] |
2. Terraform: The Automation Engine for Orchestrated Governance
While Vault provides the "proof," Terraform provides the automation and policy. This is how "Governance-as-Code" becomes a reality, creating an auditable and repeatable control plane for the entire AI lifecycle.
Infrastructure-as-Code (IaC) for the AI Lifecycle
Terraform's core capability is predictable, consistent provisioning of all cloud resources.10 The IBM acquisition announcement explicitly highlights synergies with watsonx and Red Hat 38—synergies that are already technically real.
Provisioning IBM's AI Platform: IBM provides a suite of Terraform modules to provision the entire
watsonxSaaS platform, including Watson Machine Learning, Watson Studio, and crucially, thewatsonx.governanceservice itself.40Orchestrating Secure Runtimes: The AI models governed by
watsonxrun on Red Hat OpenShift, which is increasingly using Confidential Containers.43 TheHCP Terraform Operatoris certified for Red Hat OpenShift, allowing platform teams to manage Terraform resources from Kubernetes-native workflows.44 This creates a powerful loop: an OpenShift operator triggers a Terraform run to provision a new, secure "golden image" container for an AI model on any cloud (e.g., Azure Red Hat OpenShift, which supports Confidential Containers).45
Policy-as-Code (PaC) for Provable Compliance
This is the most powerful part of the strategy: moving from provisioning infrastructure to provisioning policy.
Codifying Vault Policies: Vault uses HCL policies to govern all access.11 The
hashicorp/vaultprovider includes thevault_policyresource, allowing Terraform to manage these critical access policies as code.49 Your entire set of access controls is now versioned in Git, peer-reviewed, and fully auditable.50Codifying Attestation Policies: The
azurermTerraform provider includes theazurerm_attestation_providerresource.52 This doesn't just create an attestation service; it allows you to codify the hardware baseline (e.g., "must be SEV-SNP," "Secure Boot enabled") directly in HCL.
💡 THE UNIFIED STACK: GOVERNANCE-AS-CODE
This allows IBM to deliver a single, declarative HCL file that defines the entire governance posture from silicon to software:
Stack 1 (Hardware Policy): A
resource "azurerm_attestation_provider" "ai_governance"block defines the hardware baseline for trusted AI workloads.52The Bridge (Auth Policy): A
resource "vault_policy" "ai_workload_policy"block defines the access policy in Vault (e.g., "Allow read onsecret/ai-keyONLY for clients presenting a valid JWT from theai_governanceattestation provider").49Stack 2 (AI Policy): A
resource "ibm_resource_instance" "governance_instance"block provisions thewatsonx.governanceservice 40 to enforce application-level bias and drift checks.
This is the unification of the dual stacks. Terraform becomes the single, declarative language for the entire governance posture.
3. The "Golden Path" Workflow: Securing the AI Supply Chain
The combined stack provides a complete, two-part identity story that solves the "secret zero" paradox 54 (how to get the first secret to get other secrets).
🔑 The "Builder" Identity (Orchestration Stack): The CI/CD pipeline (e.g., GitHub Actions) authenticates to Vault using OIDC Workload Identity. The CI platform signs a JWT proving the job's identity (repo, branch). Vault validates this token and issues a short-lived Vault token for Terraform to use.51 No static secrets are stored in the CI system.
🛡️ The "Workload" Identity (Foundational Trust Stack): The AI agent deployed by that pipeline authenticates to Vault using Hardware Attestation. The Vault Agent sidecar 31 presents this hardware proof. Secrets are only released to a cryptographically verified, untampered production TEE.6
This creates an end-to-end, auditable "golden path" for deploying a governed AI agent.
4. The IBM Differentiator: The FIPS 140-2 Level 4 Fortress
This dual-stack model is powerful. But IBM's unique advantage is its ability to anchor this entire framework in its own industry-leading security hardware. This is how IBM perfects the model, creating a "fortress for the keymaker."
The Ultimate Root of Trust
Vault's security is only as strong as its master key. By default, this requires a manual, complex "unsealing" process.56 Vault Enterprise supports "Auto-Unseal" by offloading this to a Hardware Security Module (HSM).57
This is IBM's trump card.
IBM Cloud Hyper Protect Crypto Services (HPCS) is a FIPS 140-2 Level 4 certified HSM.18 This is the highest level of commercial security, protecting against invasive physical attacks. It provides a significantly higher level of assurance than the Level 2 or 3 HSMs from public cloud providers.
IBM provides guidance for integrating Vault Enterprise with HPCS for both auto-unseal and "seal wrap," 36 which adds a FIPS-compliant encryption layer for all secrets in storage.58
The "Vault-in-a-Vault": A FIPS 140-2 Level 4 Fortress
This anchors Vault's data-at-rest. But what about its data-in-use? What stops a privileged admin from dumping Vault's memory and stealing its active keys?
IBM's unique solution is the "Vault-in-a-Vault."
IBM can deploy the Vault server itself inside an IBM Hyper Protect Virtual Server (HPVS) on IBM Z.36 HPVS is its own TEE, using IBM Secure Execution to isolate the entire Vault process.
This creates an unparalleled, multi-layered security posture:
Vault's Data-at-Rest: Encrypted by a master key held in a FIPS 140-2 Level 4 HSM (HPCS).37
Vault's Data-in-Use (Memory): Encrypted and isolated from all parties (including IBM admins) within an IBM Hyper Protect TEE.36
This "fortress for the keymaker" mitigates risks from external attacks and internal logical flaws 17, providing a provably secure foundation for the entire governance strategy.
And, of course, this entire fortress is deployable via the IBM Cloud Terraform provider, which includes resources for ibm_hpcs 65 and terraform-provider-hpcr (Hyper Protect Container Runtime).67
5. Strategic Recommendations: The "Provable AI" Mandate
This analysis points to a clear, actionable strategy for IBM to dominate the high-stakes AI governance market.
Product & GTM Mandate:
Productize the "Vault-in-a-Vault": Create a managed "IBM Vault for Hyper Protect" service. This should be the default, high-security offering for all
watsonxand regulated customers, running Vault in an HPVS TEE 36 and anchored by an HPCS HSM.37Unify the Message: Stop selling "hardware," "software," and "consulting" in separate silos. The message is a single, vertically-integrated "Provable AI Governance Platform." Every
watsonx.governanceconversation must be anchored to the hardware-enforced guarantees of IBM Z and the automation of HashiCorp.Deliver the "Provable AI" Bundle: Create a flagship offering that combines:
Red Hat OpenShift Confidential Containers (The Secure Runtime)
IBM Vault for Hyper Protect (The Hardware-Anchored Broker)
Terraform (The Unified Policy Engine)
watsonx.governance(The AI Monitoring Layer)
Target High-Stakes Industries: Focus relentlessly on financial services, healthcare, public sector, and critical infrastructure, where provable, auditable, hardware-enforced governance is a non-negotiable mandate.
Future Vision: The Attested AI Factory
The final evolution is to govern the full MLOps lifecycle:
Build: Use HCP Packer 69 to build "golden images" of AI models, cryptographically capturing their TEE measurements.
Sign: Use Vault 70 as the central signing authority, attesting to these "golden images" as they move through dev, test, and prod.
Enforce: Use Terraform 49 to deploy the images and simultaneously write the definitive
vault_policy: "Only AI models signed by our 'prod' key and running in an enclave matching this exact 'golden image' measurement are allowed to access production data."
This creates a fully attested, auditable, and immutable "golden path" for AI—the ultimate and achievable goal of comprehensive AI governance.
Further Reading
Confidential Computing: The Bedrock of Trusted AI (Google Cloud)
Description: A high-level overview of how TEEs enable secure AI, data sharing, and federated learning.71
NVIDIA Confidential Computing Whitepapers (NVIDIA)
Description: Technical details on how Hopper and Blackwell architectures provide hardware-based security for AI workloads.72
IETF Remote Attestation Procedures (RATS) Architecture (IETF)
Description: The formal "rulebook" defining the "passport" and "background check" models for attestation.73
OWASP Top 10 for LLM Applications (OWASP)
Description: The essential guide to application-level AI risks, like Prompt Injection and Data Poisoning, that hardware cannot solve.74
Solving the "Secret Zero" Paradox with OIDC (All Things in Cloud)
Description: A clear walkthrough of using OIDC for workload identity in CI/CD pipelines to securely bootstrap Terraform and Vault.75
Deploying Vault in a Confidential Environment (IBM Developer)
Description: Technical tutorial on running Vault inside IBM Hyper Protect Virtual Servers (the "Vault-in-a-Vault") with HSM-based auto-unsealing.76
References
Hoop.dev Blog. (2025). How to Keep AI Access Control AI Control Attestation Secure and Compliant with Action-Level Approvals. https://hoop.dev/blog/how-to-keep-ai-access-control-ai-control-attestation-secure-and-compliant-with-action-level-approvals/ 77
Medium (Integritee). (2024). AI & Confidential Computing: Building Trustworthy AI Applications with TEEs. https://medium.com/integritee/ai-confidential-computing-building-trustworthy-ai-applications-with-tees-8b6dcf63506d 78
Confidential Computing Consortium. (2023). A Technical Analysis of Confidential Computing. (https://confidentialcomputing.io/wp-content/uploads/sites/10/2023/03/CCC-A-Technical-Analysis-of-Confidential-Computing-v1.3_unlocked.pdf) 79
Microsoft Azure. (2025). Azure confidential VMs overview. https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-vm-overview 81
IBM. (2025). IBM Z Secure Execution for Linux. (Implied capabilities). https://www.ibm.com/docs/en/linux-on-z/managing-security/secure-execution-linux 82
IBM. (2025). IBM Hyper Protect Virtual Servers. (Implied capabilities for Secure Enclaves on Z). https://www.ibm.com/products/hyper-protect-virtual-servers 83
IBM. (2025). IBM Hyper Protect Crypto Services. (Implied capabilities for FIPS 140-2 Level 4 HSM and KYOK). https://www.ibm.com/products/hyper-protect-crypto-services 84
Hoop.dev Blog. (2025). How to Keep AI Access Control... Secure... with Action-Level Approvals. https://hoop.dev/blog/how-to-keep-ai-access-control-ai-control-attestation-secure-and-compliant-with-action-level-approvals/ 85
arXiv. (2024). Performance Overhead of TEE on nVIDIA H100 GPU. https://arxiv.org/html/2409.03992v2 86
Red Hat. (2025). OpenShift confidential nodes on cVM. https://www.redhat.com/en/blog/learn-about-confidential-clusters 87
Red Hat. (2025). Power of confidential containers on Red Hat OpenShift with NVIDIA GPUs. https://www.redhat.com/en/blog/power-confidential-containers-red-hat-openshift-nvidia-gpus 89
Red Hat. (2025). OpenShift confidential containers (CoCo) is now generally available for Microsoft Azure. https://www.redhat.com/en/blog/deploy-sensitive-workloads-with-openshift-confidential-containers 90
IBM. (2025). IBM watsonx.governance. (Implied capabilities for model risk management). https://www.ibm.com/products/watsonx-governance 91
Red Hat. (2024). Attestation in confidential computing. https://www.redhat.com/en/blog/attestation-confidential-computing 24
NVIDIA. (2025). NVIDIA Confidential Computing Solutions. https://www.nvidia.com/en-us/data-center/solutions/confidential-computing/ 92
Microsoft Azure. (2025). Confidential AI use cases. https://azure.microsoft.com/en-us/solutions/confidential-compute/ 93
AWS. (2025). Confidential computing use cases. https://aws.amazon.com/confidential-computing/ 94
Galileo.ai Blog. (2025). AI Agent Architecture. https://galileo.ai/blog/ai-agent-architecture 95
OWASP. (2025). OWASP Top 10 for Large Language Model Applications. https://owasp.org/www-project-top-10-for-large-language-model-applications/ 96
IBM Think. (2025). Prevent prompt injection. https://www.ibm.com/think/insights/prevent-prompt-injection 97
Palantir. (2021). Palantir and IBM Announce New Partnership. (Implied capabilities from S_P11 in original research). https://www.palantir.com/newsroom/press-releases/palantir-and-ibm-announce-new-partnership/
PwC. (2025). Responsible AI and data governance. https://www.pwc.com/us/en/tech-effect/ai-analytics/responsible-ai-data-governance.html 98
IBM Announcements. (c. 2024). Introducing webMethods Hybrid Integration. https://www.ibm.com/new/announcements/introducing-webmethods-hybrid-integration 100
Protegrity Blog. (2025). Why AI Data Security Isn't an Add-on. https://www.progrity.com/blog/why-data-security-in-ai-isnt-add-on-built-into-every-component-pipeline/ 95
IBM Think. (2025). Data governance and AI governance: A complementary duo. https://www.ibm.com/think/insights/data-ai-governance-complementary-duo-enterprise-success 102
Mathematica. (2024). Data Governance Is Critical to Getting AI Right. https://www.mathematica.org/blogs/data-governance-is-critical-to-getting-ai-right 103
CIGIONLINE. (2025). Why We Need Inclusive Data Governance in the Age of AI. https://www.cigionline.org/articles/why-we-need-inclusive-data-governance-in-the-age-of-ai/ 98
Wiz.io Academy. (2025). AI Security. https://www.wiz.io/academy/ai-security 106
Cisco. (2025). Securing AI/ML MLOps.(https://sec.cloudapps.cisco.com/security/center/resources/SecuringAIMLOps) 101
Google Cloud Blog. (2025). Securing the AI pipeline. https://cloud.google.com/blog/topics/threat-intelligence/securing-ai-pipeline/ 108
Google Cloud. (2025). Confidential computing for data analytics, AI, and federated learning. https://docs.cloud.google.com/architecture/security/confidential-computing-analytics-ai 109
NVIDIA. (2025). NVIDIA Secure AI with Blackwell and Hopper GPUs. https://docs.nvidia.com/nvidia-secure-ai-with-blackwell-and-hopper-gpus-whitepaper.pdf 111
IETF. (2023). Remote Attestation Procedures (RATS) Architecture. https://datatracker.ietf.org/doc/html/rfc9334 112
HashiCorp. (2025). Terraform - Infrastructure as Code. (Conceptual link). https://www.terraform.io/ 10
HashiCorp. (2025). Vault - Identity-based security. (Conceptual link). https://www.vaultproject.io/ 14
HashiCorp. (2025). Vault - Policies. (Conceptual link). https://developer.hashicorp.com/vault/docs/concepts/policies 11
HashiCorp. (2025). Vault Provider for Terraform - vault_policy. (Conceptual link). https://registry.terraform.io/providers/hashicorp/vault/latest/docs/resources/policy 49
HashiCorp. (2025). Vault Agent. (Conceptual link). https://developer.hashicorp.com/vault/docs/agent 31
HashiCorp. (2025). Vault Agent - Auto-Auth. (Conceptual link). https://developer.hashicorp.com/vault/docs/agent/auto-auth 33
HashiCorp. (2025). Vault Agent Templating. (Conceptual link). https://developer.hashicorp.com/vault/docs/agent/template 35
Anjuna. (2023). Hardening HashiCorp Vault the Easy Way with Confidential Computing. https://www.anjuna.io/blog/hardening-hashicorp-vault-the-easy-way-with-confidential-computing 6
AWS. (2025). Validating attestation documents produced by AWS Nitro Enclaves. https://aws.amazon.com/blogs/compute/validating-attestation-documents-produced-by-aws-nitro-enclaves/ 7
HashiCorp. (2025). Vault Auth Method: AWS. (Conceptual link). https://developer.hashicorp.com/vault/docs/auth/aws
Microsoft Learn. (2025). Guest attestation for confidential VMs. https://learn.microsoft.com/en-us/azure/confidential-computing/guest-attestation-confidential-virtual-machines-design
HashiCorp. (2025). Vault Auth Method: JWT/OIDC. (Conceptual link). https://developer.hashicorp.com/vault/docs/auth/jwt
Google Cloud. (2025). Confidential VM attestation. https://cloud.google.com/confidential-computing/confidential-vm/docs/attestation
Google Cloud. (2025). Confidential VM attestation token claims. https://cloud.google.com/confidential-computing/confidential-vm/docs/token-claims
HashiCorp. (2025). Vault Auth Method: GCP. (Conceptual link). https://developer.hashicorp.com/vault/docs/auth/gcp
IBM Developer. (2024). Deploying Vault securely in a confidential environment. https://developer.ibm.com/tutorials/awb-deploy-vault-securely-confidential-environment/
IBM Newsroom. (2025). IBM Completes Acquisition of HashiCorp. https://newsroom.ibm.com/2025-02-27-ibm-completes-acquisition-of-hashicorp,-creates-comprehensive,-end-to-end-hybrid-cloud-platform
HashiCorp. (2025). How IBM and HashiCorp are simplifying AI-ready hybrid cloud operations. https://www.hashicorp.com/en/blog/how-ibm-and-hashicorp-are-simplifying-ai-ready-hybrid-cloud-operations
IBM GitHub. (2025). Terraform module for watsonx.ai SaaS Deployable Architecture. https://github.com/terraform-ibm-modules/terraform-ibm-watsonx-saas-da
IBM GitHub. (2025). Terraform module for watsonx.governance. https://github.com/terraform-ibm-modules/terraform-ibm-watsonx-governance
Red Hat. (2025). OpenShift confidential containers on bare metal. https://www.redhat.com/en/blog/power-confidential-containers-red-hat-openshift-nvidia-gpus
HashiCorp. (2025). HCP Terraform Operator is now certified on Red Hat OpenShift. https://www.hashicorp.com/en/blog/hcp-terraform-operator-is-now-certified-on-red-hat-openshift
Terraform Registry. (2025). azurerm_redhat_openshift_cluster. https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/redhat_openshift_cluster
Terraform Registry. (2025). rhcs provider. https://registry.terraform.io/providers/terraform-redhat/rhcs/latest/docs
Microsoft Azure. (2024). Azure Red Hat OpenShift release notes (mentions Confidential Containers preview). https://learn.microsoft.com/en-us/azure/openshift/azure-redhat-openshift-release-notes
Microsoft Learn. (2025). Quickstart: Create an Azure Attestation provider using Terraform. https://learn.microsoft.com/en-us/azure/attestation/quickstart-terraform
All Things in Cloud. (2025). Solving the Secret Zero Paradox. https://allthingsincloud.com/solving-the-secret-zero-paradox-integrating-hashicorp-vault-with-modern-ci-cd-pipelines-5c7d68516465
Cyata. (2025). Cracking the Vault: How we found zero-day flaws. https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
HashiCorp. (2025). Vault Seal/Unseal. (Conceptual link). https://developer.hashicorp.com/vault/docs/concepts/seal
HashiCorp. (2025). Vault Enterprise HSM Support. (Conceptual link). https://developer.hashicorp.com/vault/docs/enterprise/hsm
HashiCorp. (2025). Vault Seal Wrap. (Conceptual link). https://developer.hashicorp.com/vault/tutorials/archive/seal-wrap
IBM. (2025). IBM Cloud Hyper Protect Crypto Services. (Homepage). https://www.ibm.com/products/hyper-protect-crypto
GSE UK Conference. (2020). IBM Cloud Hyper Protect Crypto Services Integration. https://conferences.gse.org.uk/2020/presentations/4AZ.pdf
Terraform Registry. (2025). ibm_hpcs resource.(https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/hpcs)
IBM GitHub. (2025). terraform-provider-hpcr. https://github.com/ibm-hyper-protect/terraform-provider-hpcr
HashiCorp. (2025). Packer. (Conceptual link). https://www.packer.io/
HashiCorp. (2025). Vault Advanced Data Protection - Signing. (Conceptual link). https://developer.hashicorp.com/vault/docs/secrets/transit/signing-and-verifying

