The threat of data breaches Cryptography overview Key management options Introducing Azure Key Vault HSM Patterns and Practices
3
Don't Just Focus on Perimeter Security
4
Tamper proof Central key repository Can also store Certs (Private Keys)
5
Once a key goes in the Key Vault, it never comes out again
6
Keys vs Secrets
7
Secrets are versioned in the key Vault
8
Insurers Pll data encrypted using their own keys
9
Key Versioning
10
Password Protection
11
Salted Hash Passwords
12
Good practice to use different HMAC/ Vault Keys for different roles, it Admin, internal employee, customers etc.
13
Digital Signing
14
Data Breaches are Inevitable
Description:
Discover how to safeguard encryption keys and sensitive data using Azure Key Vault in this comprehensive conference talk. Learn to set up and configure Azure Key Vault, leveraging Hardware Security Modules (HSMs) for enhanced protection in regulated industries. Explore coding techniques, security patterns for cloud-based multi-tenant environments, and essential topics such as Azure AD authorization, application integration, local encryption key wrapping, flexible database routing with encrypted connection strings, and compliance audit logging. Gain practical knowledge to become a power user of Azure Key Vault, ensuring robust data protection in cloud environments across healthcare, financial, and insurance sectors.