New Skills

New Training: Configure and Manage Key Vault

by Team Nuggets
New Training: Configure Security for Databases picture: A
Published on March 24, 2021

In this 9-video skill, CBT Nuggets trainer Daniel Sasse talks about Azure Key vault and how to leverage it for security benefits in nearly every Azure service and resource. Watch this new Azure training.

Watch the full course: Microsoft Certified: Azure Security Engineer Associate

This training includes:

  • 9 videos

  • 45 minutes of training

You’ll learn these topics in this skill:

  • Manage Access to Key Vault

  • Manage Permissions to Secrets, Certificates, and Keys

  • Configure RBAC Usage in Azure Key Vault

  • Enable Firewall for Key Vault

  • Manage Certificates

  • Manage Secrets

  • Configure Key Rotation

  • Backup and Restore of Key Vault Items

  • Configure Azure Defender for Key Vault

Key Vault: How to Safeguard Your Secrets

Developing applications in a team environment can make identity and secret management difficult. Even if you trust your team with the keys to the kingdom, managing how and when those keys are used can be problematic at best. Using tools like Azure Key Vault streamlines and safeguards the management of those secrets.

Azure Key Vault is a way to safely secure things like API keys, SSL certs, and cryptographic keys. It adds an extra layer of security by allowing applications or team members a way to use those secrets without having access to them.

Barring security concerns, how else could you utilize Key Vault? Key Vault can help manage and segregate testing and production API keys. That means developers can build, test, and deploy applications without managing things like environment variables or configuration files. Key vault abstracts the complexity of key management away from the developers to help reduce the risk of mistakes.

Using a secret management system like Azure Key Vault can help streamline processes and maintain safety compliance in your organization. It is a tool that can easily be integrated into any hybrid or cloud environment.

Recommended Articles