Chapter 15. Securing information with Azure Key Vault
Almost every week, there’s news of a cybersecurity incident with a major company. In the same way you’ve used various forms of automation to grow or replicate your applications and data, attackers automate their own actions. It’s unlikely that a single person will manually try to compromise the security of your systems. This concept makes it difficult to defend your systems 24 hours a day, 7 days a week, 365 days a year (okay, or 366 days!).
Chapter 14 discussed how to encrypt your data and VMs. This is a great first step, and we briefly looked at how to create and use encryption keys stored with the Azure Key Vault service. Secure data, such as keys, secrets, and certificates, is best stored ...
Get Learn Azure in a Month of Lunches now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.