Boundary / Vault data for secops and compliance use cases?

Hey all,

Any of you folks use audit logs/boundary events, etc to build secops and/or security compliance dashboards? Threat hunting? Threat detection?

If so, HashiCorp is eager to hear about your experience. If you’re willing to chat with us, feel free to ping me at dan.rohan [at] hashicorp.com or send me a DM.

Thanks!