YoVDO

Protecting Encryption Keys with Azure Key Vault

Offered By: NDC Conferences via YouTube

Tags

NDC Conferences Courses Cryptography Courses Compliance Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to safeguard encryption keys and sensitive data using Azure Key Vault in this comprehensive 59-minute conference talk. Learn to set up and configure Azure Key Vault, leveraging Hardware Security Modules (HSMs) for enhanced protection of secrets, passwords, and connection strings. Explore coding techniques and security patterns for cloud-based multi-tenant environments in regulated industries like healthcare, finance, and insurance. Master the process of authorizing applications with Azure AD, accessing the vault programmatically, and implementing local encryption key wrapping for improved performance. Gain insights into encrypting connection strings as Key Vault secrets for flexible database routing in the cloud and implementing audit logging for compliance. Walk away with practical knowledge to immediately implement Azure Key Vault in your projects, ensuring robust security measures for your cloud-based data and applications.

Syllabus

Intro
Don't Just Focus on Perimeter Security
Tamper proof Central key repository Can also store Certs (Private Keys)
Once a key goes in the Key Vault, it never comes out again
Keys vs Secrets
Configuration as Secrets
Local Key Wrapping
Insurers Pll data encrypted using their own keys
Key Versioning
Password Protection
Salted Hash Passwords
Good practice to use different HMAC / Vault Keys for different roles, it Admin, internal employee, customers etc.
A digital is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document
Data Breaches are Inevitable


Taught by

NDC Conferences

Related Courses

Health Informatics: Data and Interoperability Standards
Georgia Institute of Technology via edX
Fractal Architecture
NDC Conferences via YouTube
Strangling the Monolith - Applied Patterns & Practices from the Trenches
NDC Conferences via YouTube
Refactoring Is Not Just Clickbait
NDC Conferences via YouTube
Amazing Algorithms for Solving Problems in Software
NDC Conferences via YouTube