Chapter 6: Data Security

Like everything else, data in the cloud must be treated differently from data in on-premises environments. As data is leaving our local environment and is usually accessible over the internet, we need to be extra careful. We have already mentioned that all data is encrypted at rest, and most communication goes over Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) and is encrypted on the move as well. However, there are multiple steps that we can take to ensure additional security and satisfy compliance and different security requirements.

In this chapter, we will be using Azure Key Vault extensively. We've seen how Azure Key Vault can be used for secrets and password management, but we will also see how it ...

Get Mastering Azure Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.