Chapter 12: Implementing Secrets, Keys, and Certificate Management with Key Vault

Modern applications often interact with external systems, services, and data stores. These interactions rely on privileged credentials in the form of connection strings, API keys, client secrets, and certificates. Storing these privileged credentials in code or application configuration files is a bad practice and it increases the risk of exposure or leakage.

To mitigate this risk, we need to ensure that this sensitive information is stored and handled securely and is only visible to the application that uses them at runtime. The Azure Key Vault service offers capabilities that we can use to implement this best practice. By the end of this chapter, you will have ...

Get Microsoft Azure Security Technologies Certification and Beyond now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.