SlideShare a Scribd company logo
1 of 31
Download to read offline
07/05/2020
Our sponsor
Keep your secrets and
configurations safe in Azure!
«I am Massimo, Massimo Bonanni,
Keymaster of Gozer. Volguus Zildrohar,
Lord of the Sebouillia.
Are you the Gatekeeper?»
Azure Key Vault is a
service that enables
you to store & manage
cryptographic keys
and secrets in one
central secure vault
The doubts of the IT Professionals!!
I don't want the
responsibility or
potential liability for my
customers' tenant keys
and secrets.
I want to write an
application for Azure that
uses keys for signing and
encryption. But I want
these keys to be external
from my application.
I want to make sure
that my organization is
in control of the key
lifecycle and can
monitor key usage.
I want customers to own
and manage their keys so
that I can concentrate on
doing what I do best, which
is providing the core
software features.
Azure KeyVault key features
Secrets
Management
Azure Key Vault can be
used to Securely store
and tightly control
access to tokens,
passwords, certificates,
API keys, and other
secrets
Key Management
Azure Key Vault can
also be used as a Key
Management solution.
Azure Key Vault makes
it easy to create and
control the encryption
keys used to encrypt
your data.
Certificate
Management
Azure Key Vault lets you
easily provision,
manage, and deploy
public and private
Transport Layer
Security/Secure Sockets
Layer (TLS/SSL)
certificates.
Store secrets backed
by Hardware
Security Modules
The secrets and keys
can be protected either
by software or FIPS
140-2 Level 2 validated
HSMs
Azure KeyVault actors
Vault Owner
Can create a key vault and gain
full access and control over it.
Can set up auditing to log who
accesses secrets and keys.
Can control the key lifecycle.
Can roll to a new version of
the key, back it up, and do
related tasks.
Vault Consumer
A vault consumer can perform
actions on the assets inside
the key vault when the vault
owner grants the consumer
access.
The available actions depend
on the permissions granted.
Access model overview
• The management plane is where you manage Key Vault itself
• Operations in this plane include creating and deleting key vaults,
retrieving Key Vault properties, and updating access policies
• Uses Azure Active Directory (Azure AD) for authentication
• Uses role-based access control (RBAC) for authorization
Management
Interface
• The data plane is where you work with the data stored in a key
vault
• You can add, delete, and modify keys, secrets, and certificates
• Uses Azure Active Directory (Azure AD) for authentication
• Uses a Key Vault access policy for authorization
Data
Interface
Hardware Security Module (HSM)
A hardware security module (HSM) is a physical computing device that
safeguards and manages digital keys for strong authentication and provides
cryptoprocessing.
A hardware security module contains one or more secure cryptoprocessor
chips.
HSM modules are typically certified to internationally recognized standards
such as Common Criteria or FIPS 140.
Platform Integration
Azure Disk Encryption
The always encrypted in Azure SQL Database
Azure App Service
Storage Account
ARM Template
…
DEMO
Create a KeyVault
and
Platform Integration
Supported programming and scripting
languages
REST Api .NET Java Node.js
Python Powershell Azure CLI
DEMO
C# Integration
Why use Azure Key Vault?
Centralize application secrets
Securely store secrets and keys
Monitor access and use
Simplified administration of application secrets
Integrate with other Azure services
Azure App
Configuration
provides a service to
centrally manage
application settings
and feature flag
App Configuration Key features
• Stores configuration data as key-value pairs
Key-Value
store
• Maintains a record of changes made to key-value pairs
• You can reconstruct the history of any key-value within the previous
seven days
Point-in-time
snapshot
• Decouples feature release from code deployment
• Enables quick changes to feature availability on demand
• AKA ”feature flags”
Feature
management
• Encrypt using customer-managed keys
• Using private endpoints
• Integrate with Azure Managed Identity and Azure KeyVault
Security
App Configuration benefits
A fully managed
service that can be
set up in minutes
Flexible key
representations and
mappings
Tagging with labels
Point-in-time
replay of settings
Dedicated UI for
feature flag
management
Comparison of two
sets of
configurations on
custom-defined
dimensions
Enhanced security
through Azure-
managed identities
Encryption of
sensitive
information at rest
and in transit
Native integration
with popular
frameworks
Feature Management
Feature management is a modern software-development practice that
decouples feature release from code deployment and enables quick changes to
feature availability on demand.
It uses a technique called feature flags (also known as feature toggles, feature
switches, and so on) to dynamically activate/disactivate a feature.
Shipping a new application feature requires a complete redeployment of the
application itself.
Testing a feature often requires multiple deployments of the application.
Each deployment may change the feature or expose the feature to different customers
for testing.
Point-in-time snapshot
Azure App Configuration keeps records of the precise times when a new key-
value pair is created and then modified.
These records form a complete timeline in key-value changes.
An App Configuration store can reconstruct the history of any key value and
replay its past value at any given moment, up to the present.
With this feature, you can “time-travel” backward and retrieve an old key value.
Resiliency &
disaster recovery
Azure App Configuration is a regional service.
To realize cross-region redundancy, you need to create
multiple App Configuration stores in different regions.
Your application loads its configuration from both the primary and secondary stores in
parallel.
You can use the Export function in App Configuration to copy data from the primary store
to the secondary on demand
DEMO
Configuration Management
Why use App Configuration?
Centralize management and distribution of hierarchical configuration data
for different environments and geographies
Dynamically change application settings without the need to redeploy or
restart an application
Control feature availability in real-time
Enhanced security through Azure-managed identities
Encryption of sensitive information at rest and in transit
Native integration with popular frameworks
“Companies spend millions
of dollars on firewalls and
secure access devices, and
it's money wasted because
none of these measures
address the weakest link
in the security chain: the
people who use,
administer and operate
computer systems!”
Kevin Mitnick
Thanks for your
attention!!!!!
Massimo Bonanni
Azure Technical Trainer @ Microsoft
massimo.bonanni@microsoft.com
@massimobonanni
ConnectwithmeonLinkedIn
linkedin.com/in/massimobonanni
References
Azure Key Vault documentation
https://docs.microsoft.com/en-us/azure/key-vault/
Azure Key Vault Developer's Guide
https://docs.microsoft.com/en-us/azure/key-vault/general/developers-guide
Channel9 - Azure Key Vault with Sumedh Barde
https://channel9.msdn.com/Shows/Cloud+Cover/Episode-169-Azure-Key-Vault-with-Sumedh-Barde
Azure App Configuration documentation
https://docs.microsoft.com/en-us/azure/azure-app-configuration/
What is Azure App Configuration?
https://docs.microsoft.com/en-us/azure/azure-app-configuration/overview
Channel 9 - Introducing Microsoft.FeatureManagement
https://channel9.msdn.com/Shows/NET-Community-Standups/ASPNET-Community-Standup-May-21st-2019-Introducing-
MicrosoftFeatureManagement
Channel 9 - Getting started with Azure App Configuration
https://channel9.msdn.com/Shows/Azure-Friday/Getting-started-with-Azure-App-Configuration
Channel 9 - Azure App Configuration - Making Centralized Configuration Easy
https://channel9.msdn.com/Events/dotnetConf/NET-Conf-2019/B210

More Related Content

What's hot

Windows Azure Active Directory
Windows Azure Active DirectoryWindows Azure Active Directory
Windows Azure Active Directory
Pavel Revenkov
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 

What's hot (20)

O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
 
Zero credential development with managed identities
Zero credential development with managed identitiesZero credential development with managed identities
Zero credential development with managed identities
 
Building Cloud Apps using Azure SQL Database
Building Cloud Apps using Azure SQL DatabaseBuilding Cloud Apps using Azure SQL Database
Building Cloud Apps using Azure SQL Database
 
Azure App configuration
Azure App configurationAzure App configuration
Azure App configuration
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 2
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 2Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 2
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 2
 
Zero Credential Development with Managed Identities for Azure resources
Zero Credential Development with Managed Identities for Azure resourcesZero Credential Development with Managed Identities for Azure resources
Zero Credential Development with Managed Identities for Azure resources
 
Azure operational insights
Azure operational insightsAzure operational insights
Azure operational insights
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
 
Azure AD: Enterprise-Grade Identity Provider For Your Applications
Azure AD: Enterprise-Grade Identity Provider For Your ApplicationsAzure AD: Enterprise-Grade Identity Provider For Your Applications
Azure AD: Enterprise-Grade Identity Provider For Your Applications
 
The Internet of your things by Jan Tielens
The Internet of your things by Jan  TielensThe Internet of your things by Jan  Tielens
The Internet of your things by Jan Tielens
 
Windows Azure Active Directory
Windows Azure Active DirectoryWindows Azure Active Directory
Windows Azure Active Directory
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
 
Azure Active Directory
Azure Active DirectoryAzure Active Directory
Azure Active Directory
 
Certifications for Azure Developers
Certifications for Azure DevelopersCertifications for Azure Developers
Certifications for Azure Developers
 
ITPROCEED_WorkplaceMobility_Delivering traditional File Server Workloads in a...
ITPROCEED_WorkplaceMobility_Delivering traditional File Server Workloads in a...ITPROCEED_WorkplaceMobility_Delivering traditional File Server Workloads in a...
ITPROCEED_WorkplaceMobility_Delivering traditional File Server Workloads in a...
 
O365Con18 - Azure Active Directory - Sasha Kranjac & Mustafa Toroman
O365Con18 - Azure Active Directory - Sasha Kranjac & Mustafa ToromanO365Con18 - Azure Active Directory - Sasha Kranjac & Mustafa Toroman
O365Con18 - Azure Active Directory - Sasha Kranjac & Mustafa Toroman
 
Active Directory & LDAP | Security for Elasticsearch
Active Directory & LDAP | Security for ElasticsearchActive Directory & LDAP | Security for Elasticsearch
Active Directory & LDAP | Security for Elasticsearch
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
 

Similar to Azure Meetup: Keep your secrets and configurations safe in azure!

Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
ssuser01a66e
 

Similar to Azure Meetup: Keep your secrets and configurations safe in azure! (20)

Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
 
Weblogic security
Weblogic securityWeblogic security
Weblogic security
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Introduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKIntroduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDK
 
Festive Tech Calendar 2022
Festive Tech Calendar 2022Festive Tech Calendar 2022
Festive Tech Calendar 2022
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
 
Past, Present and Future of DevOps Infrastructure
Past, Present and Future of DevOps InfrastructurePast, Present and Future of DevOps Infrastructure
Past, Present and Future of DevOps Infrastructure
 
DevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid themDevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure Architecture
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
 
Introduction to Azure
Introduction to AzureIntroduction to Azure
Introduction to Azure
 
Microsoft azure infrastructure essentials course manual
Microsoft azure infrastructure essentials   course manualMicrosoft azure infrastructure essentials   course manual
Microsoft azure infrastructure essentials course manual
 
Azure Day 1.pptx
Azure Day 1.pptxAzure Day 1.pptx
Azure Day 1.pptx
 
Techorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid themTechorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid them
 
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
 

More from dotnetcode

More from dotnetcode (19)

Azure Meetup: Novità CosmosDB modalità Serverless e Cognitive Services
Azure Meetup: Novità CosmosDB modalità Serverless e Cognitive ServicesAzure Meetup: Novità CosmosDB modalità Serverless e Cognitive Services
Azure Meetup: Novità CosmosDB modalità Serverless e Cognitive Services
 
Azure Meetup: Understanding Azure App Service Plan
Azure Meetup: Understanding Azure App Service PlanAzure Meetup: Understanding Azure App Service Plan
Azure Meetup: Understanding Azure App Service Plan
 
Azure Meetup: Azure Storage/Datalake Deep Dive
Azure Meetup: Azure Storage/Datalake Deep DiveAzure Meetup: Azure Storage/Datalake Deep Dive
Azure Meetup: Azure Storage/Datalake Deep Dive
 
Meetup Azure DevOps
Meetup Azure DevOpsMeetup Azure DevOps
Meetup Azure DevOps
 
Meetup Fluent Design e Progressive Web App
Meetup Fluent Design e Progressive Web AppMeetup Fluent Design e Progressive Web App
Meetup Fluent Design e Progressive Web App
 
Meetup Progressive Web App
Meetup Progressive Web AppMeetup Progressive Web App
Meetup Progressive Web App
 
Meetup ASP.NET Core e Kubernetes
Meetup ASP.NET Core e KubernetesMeetup ASP.NET Core e Kubernetes
Meetup ASP.NET Core e Kubernetes
 
How to create custom modules for Visual Studio
How to create custom modules for Visual StudioHow to create custom modules for Visual Studio
How to create custom modules for Visual Studio
 
Exploring VS Code
Exploring VS CodeExploring VS Code
Exploring VS Code
 
Meetup Azure DevOps
Meetup Azure DevOpsMeetup Azure DevOps
Meetup Azure DevOps
 
Meetup ASP.NET Core 2 e Docker
Meetup ASP.NET Core 2 e Docker Meetup ASP.NET Core 2 e Docker
Meetup ASP.NET Core 2 e Docker
 
Meetup DotNetCode Settembre 2018 - ASP.NET Core 2.1
Meetup DotNetCode Settembre 2018 - ASP.NET Core 2.1Meetup DotNetCode Settembre 2018 - ASP.NET Core 2.1
Meetup DotNetCode Settembre 2018 - ASP.NET Core 2.1
 
Meetup DotNetCode A.I. Bot Framework and Azure Functions
Meetup DotNetCode A.I. Bot Framework and Azure FunctionsMeetup DotNetCode A.I. Bot Framework and Azure Functions
Meetup DotNetCode A.I. Bot Framework and Azure Functions
 
Meetup DotNetCode Owasp
Meetup DotNetCode Owasp Meetup DotNetCode Owasp
Meetup DotNetCode Owasp
 
Meetup .NET & Micro ORM
Meetup .NET & Micro ORMMeetup .NET & Micro ORM
Meetup .NET & Micro ORM
 
Meetup ASP.NET Core Angular
Meetup ASP.NET Core AngularMeetup ASP.NET Core Angular
Meetup ASP.NET Core Angular
 
Webhooks Meetup
Webhooks MeetupWebhooks Meetup
Webhooks Meetup
 
Meetup DotNetCode Dependency Injection
Meetup DotNetCode Dependency InjectionMeetup DotNetCode Dependency Injection
Meetup DotNetCode Dependency Injection
 
Presentazione DotNetSchool
Presentazione DotNetSchoolPresentazione DotNetSchool
Presentazione DotNetSchool
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Azure Meetup: Keep your secrets and configurations safe in azure!

  • 3. Keep your secrets and configurations safe in Azure! «I am Massimo, Massimo Bonanni, Keymaster of Gozer. Volguus Zildrohar, Lord of the Sebouillia. Are you the Gatekeeper?»
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Azure Key Vault is a service that enables you to store & manage cryptographic keys and secrets in one central secure vault
  • 10. The doubts of the IT Professionals!! I don't want the responsibility or potential liability for my customers' tenant keys and secrets. I want to write an application for Azure that uses keys for signing and encryption. But I want these keys to be external from my application. I want to make sure that my organization is in control of the key lifecycle and can monitor key usage. I want customers to own and manage their keys so that I can concentrate on doing what I do best, which is providing the core software features.
  • 11. Azure KeyVault key features Secrets Management Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets Key Management Azure Key Vault can also be used as a Key Management solution. Azure Key Vault makes it easy to create and control the encryption keys used to encrypt your data. Certificate Management Azure Key Vault lets you easily provision, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates. Store secrets backed by Hardware Security Modules The secrets and keys can be protected either by software or FIPS 140-2 Level 2 validated HSMs
  • 12. Azure KeyVault actors Vault Owner Can create a key vault and gain full access and control over it. Can set up auditing to log who accesses secrets and keys. Can control the key lifecycle. Can roll to a new version of the key, back it up, and do related tasks. Vault Consumer A vault consumer can perform actions on the assets inside the key vault when the vault owner grants the consumer access. The available actions depend on the permissions granted.
  • 13. Access model overview • The management plane is where you manage Key Vault itself • Operations in this plane include creating and deleting key vaults, retrieving Key Vault properties, and updating access policies • Uses Azure Active Directory (Azure AD) for authentication • Uses role-based access control (RBAC) for authorization Management Interface • The data plane is where you work with the data stored in a key vault • You can add, delete, and modify keys, secrets, and certificates • Uses Azure Active Directory (Azure AD) for authentication • Uses a Key Vault access policy for authorization Data Interface
  • 14. Hardware Security Module (HSM) A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. A hardware security module contains one or more secure cryptoprocessor chips. HSM modules are typically certified to internationally recognized standards such as Common Criteria or FIPS 140.
  • 15. Platform Integration Azure Disk Encryption The always encrypted in Azure SQL Database Azure App Service Storage Account ARM Template …
  • 17. Supported programming and scripting languages REST Api .NET Java Node.js Python Powershell Azure CLI
  • 19. Why use Azure Key Vault? Centralize application secrets Securely store secrets and keys Monitor access and use Simplified administration of application secrets Integrate with other Azure services
  • 20. Azure App Configuration provides a service to centrally manage application settings and feature flag
  • 21. App Configuration Key features • Stores configuration data as key-value pairs Key-Value store • Maintains a record of changes made to key-value pairs • You can reconstruct the history of any key-value within the previous seven days Point-in-time snapshot • Decouples feature release from code deployment • Enables quick changes to feature availability on demand • AKA ”feature flags” Feature management • Encrypt using customer-managed keys • Using private endpoints • Integrate with Azure Managed Identity and Azure KeyVault Security
  • 22. App Configuration benefits A fully managed service that can be set up in minutes Flexible key representations and mappings Tagging with labels Point-in-time replay of settings Dedicated UI for feature flag management Comparison of two sets of configurations on custom-defined dimensions Enhanced security through Azure- managed identities Encryption of sensitive information at rest and in transit Native integration with popular frameworks
  • 23. Feature Management Feature management is a modern software-development practice that decouples feature release from code deployment and enables quick changes to feature availability on demand. It uses a technique called feature flags (also known as feature toggles, feature switches, and so on) to dynamically activate/disactivate a feature. Shipping a new application feature requires a complete redeployment of the application itself. Testing a feature often requires multiple deployments of the application. Each deployment may change the feature or expose the feature to different customers for testing.
  • 24. Point-in-time snapshot Azure App Configuration keeps records of the precise times when a new key- value pair is created and then modified. These records form a complete timeline in key-value changes. An App Configuration store can reconstruct the history of any key value and replay its past value at any given moment, up to the present. With this feature, you can “time-travel” backward and retrieve an old key value.
  • 25. Resiliency & disaster recovery Azure App Configuration is a regional service. To realize cross-region redundancy, you need to create multiple App Configuration stores in different regions. Your application loads its configuration from both the primary and secondary stores in parallel. You can use the Export function in App Configuration to copy data from the primary store to the secondary on demand
  • 27. Why use App Configuration? Centralize management and distribution of hierarchical configuration data for different environments and geographies Dynamically change application settings without the need to redeploy or restart an application Control feature availability in real-time Enhanced security through Azure-managed identities Encryption of sensitive information at rest and in transit Native integration with popular frameworks
  • 28. “Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer and operate computer systems!” Kevin Mitnick
  • 29.
  • 30. Thanks for your attention!!!!! Massimo Bonanni Azure Technical Trainer @ Microsoft massimo.bonanni@microsoft.com @massimobonanni ConnectwithmeonLinkedIn linkedin.com/in/massimobonanni
  • 31. References Azure Key Vault documentation https://docs.microsoft.com/en-us/azure/key-vault/ Azure Key Vault Developer's Guide https://docs.microsoft.com/en-us/azure/key-vault/general/developers-guide Channel9 - Azure Key Vault with Sumedh Barde https://channel9.msdn.com/Shows/Cloud+Cover/Episode-169-Azure-Key-Vault-with-Sumedh-Barde Azure App Configuration documentation https://docs.microsoft.com/en-us/azure/azure-app-configuration/ What is Azure App Configuration? https://docs.microsoft.com/en-us/azure/azure-app-configuration/overview Channel 9 - Introducing Microsoft.FeatureManagement https://channel9.msdn.com/Shows/NET-Community-Standups/ASPNET-Community-Standup-May-21st-2019-Introducing- MicrosoftFeatureManagement Channel 9 - Getting started with Azure App Configuration https://channel9.msdn.com/Shows/Azure-Friday/Getting-started-with-Azure-App-Configuration Channel 9 - Azure App Configuration - Making Centralized Configuration Easy https://channel9.msdn.com/Events/dotnetConf/NET-Conf-2019/B210