SlideShare a Scribd company logo
2
Most read
14
Most read
17
Most read
Getting Started with
Rahul P Nath
Azure Key Vault
Azure Key Vault
Cloud hosted, HSM(Hardware Security Modules)-
backed service for managing cryptographic keys
and other secrets
Azure key vault
Azure Key Vault
• Container of Objects
• Cost is per Object operations
$0.03 / 10,000 operations
http://bit.ly/keyvaultpricing
Objects
• Keys, Secrets and Certificates
• Identifier
https://{keyvault-name}.vault.azure.net/{object-type}/{object-name}/{object-version}
Keys
• RSA Keys (asymmetric public-private key
cryptosystem)
https://mytestvault.vault.azure.net/keys/mytestkey/cfedea84815e4ca8bc19cf8eb943ee13
Azure key vault
Secrets
• Octet sequences with no semantics
• Connection Strings, Passwords etc.
https://mytestvault.vault.azure.net/secrets/mytestsecret/dcerea54614e4ca7ge14cf2eb943dd45
Certificates
• Import Existing Certificates, Self-signed or Enrol from Public
Certificate Authority (DigiCert, GlobalSign and WoSign)
https://mytestvault.vault.azure.net/certificates/mycertificate/cfedea84815e4ca8bc19cf8eb943ee13
Typical Application Scenario
• Web Application, connects to a Database
• Connection String is in configuration file
Problems
• Security
• Maintenance
How Key Vault Fits in?
• Cloud Hosted
• Accessible over Web API
Azure key vault
Demo
• Create Key Vault and Secret
Key Vault Authentication
• Azure Active Directory (AD) Application
• Access Policies
• Authenticate using Certificate or Secret
Demo
• Create Key Vault and Secret
• Create Azure AD Application
• Consuming Secret
Key Vault and Development Cycle
• Externalize into configuration
Vault Url https://{keyvault-name}.vault.azure.net
Value /{object-type}/{object-name}/{object-version}
• Sensitive information is managed separately
Thank You
@rahulpnath
http://www.rahulpnath.com

More Related Content

PPTX
Azure Key Vault - Getting Started
PDF
Azure Service Endpoints vs. Private Links
PPTX
Azure Storage
PPTX
Azure Security and Management
PPTX
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
PPTX
A Deepdive into Azure Networking
PPTX
Introducing Azure Arc
PPTX
Azure Express Route
Azure Key Vault - Getting Started
Azure Service Endpoints vs. Private Links
Azure Storage
Azure Security and Management
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
A Deepdive into Azure Networking
Introducing Azure Arc
Azure Express Route

What's hot (20)

PDF
Azure Arc Overview from Microsoft
PPTX
Azure security and Compliance
PDF
Azure Security Overview
PPTX
Azure Security Overview
PPTX
Azure Security Fundamentals
PPTX
Azure Identity and access management
PDF
Microsoft Defender and Azure Sentinel
PPTX
Azure Active Directory - An Introduction
PPTX
Azure active directory
PDF
Microsoft Azure Security Overview
PDF
Microsoft Azure Active Directory
PDF
Understanding Azure AD
PPTX
Azure AD Connect
PDF
Azure 101
PDF
Introduction to Azure Sentinel
PDF
Az 104 session 6 azure networking part2
PDF
Microsoft Azure Overview
PDF
introduction to Azure Sentinel
PDF
Azure SQL Database
PPTX
Microsoft Azure - Introduction
Azure Arc Overview from Microsoft
Azure security and Compliance
Azure Security Overview
Azure Security Overview
Azure Security Fundamentals
Azure Identity and access management
Microsoft Defender and Azure Sentinel
Azure Active Directory - An Introduction
Azure active directory
Microsoft Azure Security Overview
Microsoft Azure Active Directory
Understanding Azure AD
Azure AD Connect
Azure 101
Introduction to Azure Sentinel
Az 104 session 6 azure networking part2
Microsoft Azure Overview
introduction to Azure Sentinel
Azure SQL Database
Microsoft Azure - Introduction
Ad

Viewers also liked (8)

PPTX
Securing sensitive data with Azure Key Vault
PPTX
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
PDF
Cloud Native Key Management
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
PPTX
GAB 2015 - Nouveautes sur le stockage de donnees dans Azure
PPTX
Improving Application Security With Azure
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing sensitive data with Azure Key Vault
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Cloud Native Key Management
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
GAB 2015 - Nouveautes sur le stockage de donnees dans Azure
Improving Application Security With Azure
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Ad

Similar to Azure key vault (20)

PPTX
Azure key vault - Brisbane User Group
PPTX
Managing your secrets in a cloud environment
PPTX
Azure Key Vault
PDF
Secretsth-Azure-KeyVault-and-Azure-App.pdf
PDF
Secretsth-Azure-KeyVault-and-Azure-App.pdf
PPTX
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
PDF
Azure Meetup: Keep your secrets and configurations safe in azure!
PPTX
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
PPTX
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
PPTX
AzureSecurity - Day3 - Storage And Key Vault
PDF
Application Security - Key Vault
PPTX
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
PDF
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
PPTX
TechEvent Data Encryption in Azure
PPTX
Secure your Config with Key Vault for .NET Core API
PPTX
Secure your Config with Key Vault for Node.JS
PPTX
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
PDF
Service for Storing Secrets on Microsoft Azure.pdf
PDF
Vault
Azure key vault - Brisbane User Group
Managing your secrets in a cloud environment
Azure Key Vault
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Global Azure Bootcamp 2017 - Azure Key Vault
Azure Meetup: Keep your secrets and configurations safe in azure!
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
AzureSecurity - Day3 - Storage And Key Vault
Application Security - Key Vault
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
TechEvent Data Encryption in Azure
Secure your Config with Key Vault for .NET Core API
Secure your Config with Key Vault for Node.JS
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Service for Storing Secrets on Microsoft Azure.pdf
Vault

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Azure key vault

Editor's Notes

  • #3: Service is exposed over a REST API Supports Hardware and Software Keys
  • #4: HSM Device, keys are stored on physical device
  • #7: Private portion never leaves the boundary of the vault Sign/Verify (local) Encrypt (local)/Decrypt Wrap local)/Unwrap
  • #12: Anyone that has access to config/servers To change a connection string you need to change in all applications that uses it.
  • #16: Access Policies are at the Object type level – Keys, Secrets, Certificates To set policies at the key level will need to create different key vaults
  • #18: Separate the Vault url and the object identifier part if you want to avoid repeating the URL. Admin can manage the sensitive information separately