All posts

The port was open, but the gate was locked.

HashiCorp Boundary gives you secure remote access without exposing your network to the internet. Nmap gives you the truth about what’s running and where. Together, they let you map, lock down, and control access to infrastructure with precision. Boundary separates authentication from network location. Users never see the private IPs of targets. Access happens through session-based credentials, short-lived and centrally controlled. Nmap scans tell you exactly which ports and services exist befor

Free White Paper

Open Policy Agent (OPA): The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

HashiCorp Boundary gives you secure remote access without exposing your network to the internet. Nmap gives you the truth about what’s running and where. Together, they let you map, lock down, and control access to infrastructure with precision.

Boundary separates authentication from network location. Users never see the private IPs of targets. Access happens through session-based credentials, short-lived and centrally controlled. Nmap scans tell you exactly which ports and services exist before you decide who can reach them. This combination turns what used to be a sprawling attack surface into a controlled entry point.

Run Nmap on your internal network to identify hosts, services, and open ports. Feed that information into Boundary’s target definitions. Instead of keeping long-lived VPN tunnels open, grant just-in-time access for specific sessions. Nmap’s detailed service detection makes it clear what should be exposed, and Boundary ensures it’s only exposed to the right person at the right time.

Continue reading? Get the full guide.

Open Policy Agent (OPA): Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

For example, Nmap can reveal an outdated SSH service on a production host. Boundary can configure access so that only approved engineers can connect, and only through a session that’s authenticated, audited, and revoked automatically when done. No direct routes, no persistent keys, no guesswork.

This workflow scales across clouds, data centers, and hybrid setups. Nmap informs your view of the network’s reality. Boundary enforces the policy that reality demands. When both are in your toolchain, security policies stop being theoretical and start matching the real network state.

Use HashiCorp Boundary with Nmap to build a living map of your infrastructure and defend it with surgical control. See it live in minutes at hoop.dev.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts