YoVDO

Protecting Encryption Keys with Azure Key Vault

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Cryptography Courses Compliance Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to safeguard encryption keys and sensitive data using Azure Key Vault in this comprehensive 59-minute conference talk. Learn to set up and configure Azure Key Vault, leveraging Hardware Security Modules (HSMs) for enhanced protection of secrets, passwords, and connection strings. Explore coding techniques and security patterns for cloud-based multi-tenant environments in regulated industries like healthcare, finance, and insurance. Master the process of authorizing applications with Azure AD, accessing the vault programmatically, and implementing local encryption key wrapping for improved performance. Gain insights into encrypting connection strings as Key Vault secrets for flexible database routing in the cloud and implementing audit logging for compliance. Walk away with practical knowledge to immediately implement Azure Key Vault in your projects, ensuring robust security measures for your cloud-based data and applications.

Syllabus

Intro
Don't Just Focus on Perimeter Security
Tamper proof Central key repository Can also store Certs (Private Keys)
Once a key goes in the Key Vault, it never comes out again
Keys vs Secrets
Configuration as Secrets
Local Key Wrapping
Insurers Pll data encrypted using their own keys
Key Versioning
Password Protection
Salted Hash Passwords
Good practice to use different HMAC / Vault Keys for different roles, it Admin, internal employee, customers etc.
A digital is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document
Data Breaches are Inevitable


Taught by

NDC Conferences

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera