The threat of data breaches Cryptography overview Key management options Introducing Azure Key Vault HSM Patterns and Practices
3
Data Breaches are Inevitable
4
Don't Just Focus on Perimeter Security
5
aws AWS HSM & AWS KMS
6
Once a Key goes in the Key Vault, it never comes out again
7
Keys vs Secrets
8
Multiple Vaults for Environments
9
NEVER share keys from production in any other environment
10
Secrets are versioned in the Key Vault
11
Salted Hash Passwords
12
A digital is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document
Description:
Discover how to safeguard encryption keys and sensitive data using Azure Key Vault in this comprehensive conference talk. Learn to set up and configure Azure Key Vault, leveraging Hardware Security Modules (HSMs) for enhanced protection in regulated industries like healthcare, finance, and insurance. Explore coding techniques, security patterns for cloud-based multi-tenant environments, and essential topics such as Azure AD authorization, application access to the vault, local encryption key wrapping, connection string encryption, and audit logging for compliance. Gain practical knowledge to immediately implement Azure Key Vault in your projects, ensuring robust data protection against potential breaches in cloud environments.