Protecting Encryption Keys with Azure Key Vault
Offered By: NDC Conferences via YouTube
Course Description
Overview
Discover how to safeguard encryption keys and sensitive data using Azure Key Vault in this comprehensive 59-minute conference talk. Learn to set up and configure Azure Key Vault, leveraging Hardware Security Modules (HSMs) for enhanced protection of secrets, passwords, and connection strings. Explore coding techniques and security patterns for cloud-based multi-tenant environments in regulated industries like healthcare, finance, and insurance. Master the process of authorizing applications with Azure AD, accessing the vault programmatically, and implementing local encryption key wrapping for improved performance. Gain insights into encrypting connection strings as Key Vault secrets for flexible database routing in the cloud and implementing audit logging for compliance. Walk away with practical knowledge to immediately implement Azure Key Vault in your projects, ensuring robust security measures for your cloud-based data and applications.
Syllabus
Intro
Don't Just Focus on Perimeter Security
Tamper proof Central key repository Can also store Certs (Private Keys)
Once a key goes in the Key Vault, it never comes out again
Keys vs Secrets
Configuration as Secrets
Local Key Wrapping
Insurers Pll data encrypted using their own keys
Key Versioning
Password Protection
Salted Hash Passwords
Good practice to use different HMAC / Vault Keys for different roles, it Admin, internal employee, customers etc.
A digital is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document
Data Breaches are Inevitable
Taught by
NDC Conferences
Related Courses
Health Informatics: Data and Interoperability StandardsGeorgia Institute of Technology via edX Fractal Architecture
NDC Conferences via YouTube Strangling the Monolith - Applied Patterns & Practices from the Trenches
NDC Conferences via YouTube Refactoring Is Not Just Clickbait
NDC Conferences via YouTube Amazing Algorithms for Solving Problems in Software
NDC Conferences via YouTube