SlideShare a Scribd company logo
1 of 29
Download to read offline
1
ARGOMENTO
2
ARGOMENTO
Secrets safe and centralize with Azure
KeyVault and Azure App Configuration!
«My name is Bonanni,
Massimo Bonanni»
Azure Key Vault is a
service that enables you to
store & manage
cryptographic keys and
secrets in one central
secure vault!!
The doubts of the Developers and IT Pros!!
I don't want the
responsibility or potential
liability for my customers'
tenant keys and secrets.
I want to write an
application for Azure that
uses keys for signing and
encryption. But I want
these keys to be external
from my application.
I want customers to own and
manage their keys so that I
can concentrate on doing
what I do best, which is
providing the core software
features.
I want to make sure that
my organization is in
control of the key
lifecycle and can monitor
key usage.
Azure KeyVault key features
Secrets
Management
Azure Key Vault can be
used to Securely store
and tightly control access
to tokens, passwords,
certificates, API keys, and
other secrets
Key Management
Azure Key Vault can also
be used as a Key
Management solution.
Azure Key Vault makes it
easy to create and
control the encryption
keys used to encrypt your
data.
Certificate
Management
Azure Key Vault lets you
easily provision, manage,
and deploy public and
private Transport Layer
Security/Secure Sockets
Layer (TLS/SSL)
certificates.
Store secrets
backed by
Hardware Security
Modules
The secrets and keys can
be protected either by
software or FIPS 140-2
Level 2 validated HSMs
Azure KeyVault actors
Vault Custodian
• Can create a key vault and
gain full access and control
over it.
• Can set up auditing to log
who accesses secrets and
keys.
• Can control the key
lifecycle. Can roll to a new
version of the key, back it
up, and do related tasks.
Vault Consumer
• A vault consumer can
perform actions on the
assets inside the key vault
when the vault owner
grants the consumer
access.
• The available actions
depend on the permissions
granted.
Access model overview
• The management plane is where you manage Key Vault itself
• Operations in this plane include creating and deleting key
vaults, retrieving Key Vault properties, and updating access
policies
• Uses Azure Active Directory (Azure AD) for authentication
• Uses role-based access control (RBAC) for authorization
Management
Plane
Interface
• The data plane is where you work with the data stored in a key
vault
• You can add, delete, and modify keys, secrets, and certificates
• Uses Azure Active Directory (Azure AD) for authentication
• Uses a Key Vault access policy for authorization
Data Plane
Interface
Hardware Security Module (HSM)
A hardware security module (HSM) is a physical computing device that
safeguards and manages digital keys for strong authentication and
provides cryptoprocessing.
A hardware security module contains one or more secure cryptoprocessor
chips.
HSM modules are typically certified to internationally recognized
standards such as Common Criteria or FIPS 140.
Platform Integration
Azure Disk Encryption
Trasparent Data Encryptionin Azure SQL Database
Azure App Service
Storage Account
ARM Template
Azure DevOps pipelines
…
How much?
Two different plans: Standard and
Premium
Operations against all keys, secrets,
and certificates are billed at a flat rate
of €0.026 per 10,000 operations
Renewals of certificates: €2.530 per
renewal request.
Software-Protected Keys:
•RSA 2048-bit keys, €0.026/10,000 transactions
•RSA 3072-bit, RSA 4096-bit, and Elliptic-Curve
Cryptography (ECC) keys, €0.127/10,000
transactions
HSM-protected keys (only premium)
•RSA 2048-bit keys €0.844 per key per
month + €0.026/10,000 transactions
Create a KeyVault
and
Platform Integration
Supported programming and scripting languages
REST Api .NET Java
Node.js Python
Azure
Powershell
Azure CLI
C# integration
Why use Azure Key Vault?
Centralize application secrets
Securely store secrets and keys
Monitor access and use
Simplified administration of application secrets
Integrate with other Azure services
Azure App
Configuration provides
a service to centrally
manage application
settings and feature
flag
App Configuration Key features
• Stores configuration data as key-value pairs
Key-Value
store
• Maintains a record of changes made to key-value pairs
• You can reconstruct the history of any key-value within the previous
seven days
Point-in-time
snapshot
• Decouples feature release from code deployment
• Enables quick changes to feature availability on demand
• AKA ”feature flags”
Feature
management
• Encrypt using customer-managed keys
• Using private endpoints
• Integrate with Azure Managed Identity and Azure KeyVault
Security
App Configuration benefits
A fully managed
service that can be
set up in minutes
Flexible key
representations
and mappings
Tagging with labels
Point-in-time
replay of settings
Dedicated UI for
feature flag
management
Comparison of two
sets of
configurations on
custom-defined
dimensions
Enhanced security
through Azure-
managed identities
Encryption of
sensitive
information at rest
and in transit
Native integration
with popular
frameworks
Feature Management
Feature management is a modern software-development
practice that decouples feature release from code
deployment and enables quick changes to feature availability
on demand.
It uses a technique called feature flags (also known
as feature toggles, feature switches, and so on) to
dynamically activate/disactivate a feature.
Feature Flag
Feature Management – Basic Concepts
A feature flag is a variable with a binary state of on or off. The feature flag also
has an associated code block.
The feature flag's state triggers whether the code block runs.
Feature
flag
A feature manager is an application package that handles the life cycle of all the
feature flags in an application.
The feature manager also provides additional functionality, including caching
feature flags and updating their states.
Feature
manager
A filter is a rule for evaluating the state of a feature flag.
Potential filters include user groups, device or browser types, geographic
locations, and time windows.
Filter
Point-in-time snapshot
Azure App Configuration keeps records of the precise times when a new
key-value pair is created and then modified.
These records form a complete timeline in key-value changes.
An App Configuration store can reconstruct the history of any key value
and replay its past value at any given moment, up to the present.
With this feature, you can “time-travel” backward and retrieve an old
key value.
Resiliency and disaster recovery
Azure App Configuration is a regional service.
To realize cross-region redundancy, you need to create
multiple App Configuration stores in different regions.
Your application loads its configuration from both the primary and secondary stores.
You can use the Export function in App Configuration to copy data from the primary store to the
secondary on demand
How much?
Web Site
Configuration
Why use App Configuration?
Centralize management and distribution of hierarchical
configuration data for different environments and geographies
Dynamically change application settings without the need to
redeploy or restart an application
Control feature availability in real-time
Enhanced security through Azure-managed identities
Encryption of sensitive information at rest and in transit
Native integration with popular frameworks
“
Companies spend millions of dollars on
firewalls and secure access devices,
and it's money wasted because none
of these measures address the
weakest link in the security chain:
the people who use, administer and
operate computer systems!
Kevin Mitnick
Thanks for your
attention!!!!!
Massimo Bonanni
Azure Technical Trainer @ Microsoft
massimo.bonanni@microsoft.com
@massimobonanni
Connect with me on LinkedIn
linkedin.com/in/massimobonanni
References
Azure Key Vault documentation
https://docs.microsoft.com/en-us/azure/key-vault/
Azure Key Vault Developer's Guide
https://docs.microsoft.com/en-us/azure/key-vault/general/developers-guide
Channel9 - Azure Key Vault with Sumedh Barde
https://channel9.msdn.com/Shows/Cloud+Cover/Episode-169-Azure-Key-Vault-with-Sumedh-Barde
Azure App Configuration documentation
https://docs.microsoft.com/en-us/azure/azure-app-configuration/
What is Azure App Configuration?
https://docs.microsoft.com/en-us/azure/azure-app-configuration/overview
Channel 9 - Introducing Microsoft.FeatureManagement
https://channel9.msdn.com/Shows/NET-Community-Standups/ASPNET-Community-Standup-May-21st-2019-Introducing-
MicrosoftFeatureManagement
Channel 9 - Getting started with Azure App Configuration
https://channel9.msdn.com/Shows/Azure-Friday/Getting-started-with-Azure-App-Configuration
Channel 9 - Azure App Configuration - Making Centralized Configuration Easy
https://channel9.msdn.com/Events/dotnetConf/NET-Conf-2019/B210

More Related Content

Similar to Secure secrets and centralized configs with Azure KeyVault and App Configuration

Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting StartedTaswar Bhatti
 
Azure from scratch part 3 By Girish Kalamati
Azure from scratch part 3 By Girish KalamatiAzure from scratch part 3 By Girish Kalamati
Azure from scratch part 3 By Girish KalamatiGirish Kalamati
 
DevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid themDevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid themKarl Ots
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure ArchitectureKarthikeyan VK
 
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...ssuser01a66e
 
Introduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKIntroduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKPeter Selch Dahl
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...NCCOMMS
 
Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...
Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...
Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...Kasun Kodagoda
 
Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScaleAmazon Web Services
 
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...Stenio Ferreira
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, augustTokyo Azure Meetup
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustKanio Dimitrov
 
Techorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid themTechorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid themKarl Ots
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentRoy Kim
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsAmazon Web Services
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Azure SQL Database Managed Instance - technical overview
Azure SQL Database Managed Instance - technical overviewAzure SQL Database Managed Instance - technical overview
Azure SQL Database Managed Instance - technical overviewGeorge Walters
 
Introducing Azure Arc
Introducing Azure ArcIntroducing Azure Arc
Introducing Azure ArcMohamed Wali
 

Similar to Secure secrets and centralized configs with Azure KeyVault and App Configuration (20)

Past, Present and Future of DevOps Infrastructure
Past, Present and Future of DevOps InfrastructurePast, Present and Future of DevOps Infrastructure
Past, Present and Future of DevOps Infrastructure
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Azure from scratch part 3 By Girish Kalamati
Azure from scratch part 3 By Girish KalamatiAzure from scratch part 3 By Girish Kalamati
Azure from scratch part 3 By Girish Kalamati
 
DevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid themDevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure Architecture
 
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
MSFT MAIW Data Mod - Session 1 Deck_Why Migrate your databases to Azure_Sept ...
 
Introduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKIntroduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDK
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
 
Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...
Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...
Feature Toggle for .Net Core Apps on Azure with Azure App Configuration Featu...
 
oracle
oracleoracle
oracle
 
Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud Scale
 
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, august
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, August
 
Techorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid themTechorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid them
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOps
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Azure SQL Database Managed Instance - technical overview
Azure SQL Database Managed Instance - technical overviewAzure SQL Database Managed Instance - technical overview
Azure SQL Database Managed Instance - technical overview
 
Introducing Azure Arc
Introducing Azure ArcIntroducing Azure Arc
Introducing Azure Arc
 

Recently uploaded

Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 

Recently uploaded (20)

Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 

Secure secrets and centralized configs with Azure KeyVault and App Configuration

  • 2. 2 ARGOMENTO Secrets safe and centralize with Azure KeyVault and Azure App Configuration! «My name is Bonanni, Massimo Bonanni»
  • 3.
  • 4. Azure Key Vault is a service that enables you to store & manage cryptographic keys and secrets in one central secure vault!!
  • 5. The doubts of the Developers and IT Pros!! I don't want the responsibility or potential liability for my customers' tenant keys and secrets. I want to write an application for Azure that uses keys for signing and encryption. But I want these keys to be external from my application. I want customers to own and manage their keys so that I can concentrate on doing what I do best, which is providing the core software features. I want to make sure that my organization is in control of the key lifecycle and can monitor key usage.
  • 6. Azure KeyVault key features Secrets Management Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets Key Management Azure Key Vault can also be used as a Key Management solution. Azure Key Vault makes it easy to create and control the encryption keys used to encrypt your data. Certificate Management Azure Key Vault lets you easily provision, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates. Store secrets backed by Hardware Security Modules The secrets and keys can be protected either by software or FIPS 140-2 Level 2 validated HSMs
  • 7. Azure KeyVault actors Vault Custodian • Can create a key vault and gain full access and control over it. • Can set up auditing to log who accesses secrets and keys. • Can control the key lifecycle. Can roll to a new version of the key, back it up, and do related tasks. Vault Consumer • A vault consumer can perform actions on the assets inside the key vault when the vault owner grants the consumer access. • The available actions depend on the permissions granted.
  • 8. Access model overview • The management plane is where you manage Key Vault itself • Operations in this plane include creating and deleting key vaults, retrieving Key Vault properties, and updating access policies • Uses Azure Active Directory (Azure AD) for authentication • Uses role-based access control (RBAC) for authorization Management Plane Interface • The data plane is where you work with the data stored in a key vault • You can add, delete, and modify keys, secrets, and certificates • Uses Azure Active Directory (Azure AD) for authentication • Uses a Key Vault access policy for authorization Data Plane Interface
  • 9. Hardware Security Module (HSM) A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. A hardware security module contains one or more secure cryptoprocessor chips. HSM modules are typically certified to internationally recognized standards such as Common Criteria or FIPS 140.
  • 10. Platform Integration Azure Disk Encryption Trasparent Data Encryptionin Azure SQL Database Azure App Service Storage Account ARM Template Azure DevOps pipelines …
  • 11. How much? Two different plans: Standard and Premium Operations against all keys, secrets, and certificates are billed at a flat rate of €0.026 per 10,000 operations Renewals of certificates: €2.530 per renewal request. Software-Protected Keys: •RSA 2048-bit keys, €0.026/10,000 transactions •RSA 3072-bit, RSA 4096-bit, and Elliptic-Curve Cryptography (ECC) keys, €0.127/10,000 transactions HSM-protected keys (only premium) •RSA 2048-bit keys €0.844 per key per month + €0.026/10,000 transactions
  • 13. Supported programming and scripting languages REST Api .NET Java Node.js Python Azure Powershell Azure CLI
  • 15. Why use Azure Key Vault? Centralize application secrets Securely store secrets and keys Monitor access and use Simplified administration of application secrets Integrate with other Azure services
  • 16. Azure App Configuration provides a service to centrally manage application settings and feature flag
  • 17. App Configuration Key features • Stores configuration data as key-value pairs Key-Value store • Maintains a record of changes made to key-value pairs • You can reconstruct the history of any key-value within the previous seven days Point-in-time snapshot • Decouples feature release from code deployment • Enables quick changes to feature availability on demand • AKA ”feature flags” Feature management • Encrypt using customer-managed keys • Using private endpoints • Integrate with Azure Managed Identity and Azure KeyVault Security
  • 18. App Configuration benefits A fully managed service that can be set up in minutes Flexible key representations and mappings Tagging with labels Point-in-time replay of settings Dedicated UI for feature flag management Comparison of two sets of configurations on custom-defined dimensions Enhanced security through Azure- managed identities Encryption of sensitive information at rest and in transit Native integration with popular frameworks
  • 19. Feature Management Feature management is a modern software-development practice that decouples feature release from code deployment and enables quick changes to feature availability on demand. It uses a technique called feature flags (also known as feature toggles, feature switches, and so on) to dynamically activate/disactivate a feature.
  • 21. Feature Management – Basic Concepts A feature flag is a variable with a binary state of on or off. The feature flag also has an associated code block. The feature flag's state triggers whether the code block runs. Feature flag A feature manager is an application package that handles the life cycle of all the feature flags in an application. The feature manager also provides additional functionality, including caching feature flags and updating their states. Feature manager A filter is a rule for evaluating the state of a feature flag. Potential filters include user groups, device or browser types, geographic locations, and time windows. Filter
  • 22. Point-in-time snapshot Azure App Configuration keeps records of the precise times when a new key-value pair is created and then modified. These records form a complete timeline in key-value changes. An App Configuration store can reconstruct the history of any key value and replay its past value at any given moment, up to the present. With this feature, you can “time-travel” backward and retrieve an old key value.
  • 23. Resiliency and disaster recovery Azure App Configuration is a regional service. To realize cross-region redundancy, you need to create multiple App Configuration stores in different regions. Your application loads its configuration from both the primary and secondary stores. You can use the Export function in App Configuration to copy data from the primary store to the secondary on demand
  • 26. Why use App Configuration? Centralize management and distribution of hierarchical configuration data for different environments and geographies Dynamically change application settings without the need to redeploy or restart an application Control feature availability in real-time Enhanced security through Azure-managed identities Encryption of sensitive information at rest and in transit Native integration with popular frameworks
  • 27. “ Companies spend millions of dollars on firewalls and secure access devices, and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer and operate computer systems! Kevin Mitnick
  • 28. Thanks for your attention!!!!! Massimo Bonanni Azure Technical Trainer @ Microsoft massimo.bonanni@microsoft.com @massimobonanni Connect with me on LinkedIn linkedin.com/in/massimobonanni
  • 29. References Azure Key Vault documentation https://docs.microsoft.com/en-us/azure/key-vault/ Azure Key Vault Developer's Guide https://docs.microsoft.com/en-us/azure/key-vault/general/developers-guide Channel9 - Azure Key Vault with Sumedh Barde https://channel9.msdn.com/Shows/Cloud+Cover/Episode-169-Azure-Key-Vault-with-Sumedh-Barde Azure App Configuration documentation https://docs.microsoft.com/en-us/azure/azure-app-configuration/ What is Azure App Configuration? https://docs.microsoft.com/en-us/azure/azure-app-configuration/overview Channel 9 - Introducing Microsoft.FeatureManagement https://channel9.msdn.com/Shows/NET-Community-Standups/ASPNET-Community-Standup-May-21st-2019-Introducing- MicrosoftFeatureManagement Channel 9 - Getting started with Azure App Configuration https://channel9.msdn.com/Shows/Azure-Friday/Getting-started-with-Azure-App-Configuration Channel 9 - Azure App Configuration - Making Centralized Configuration Easy https://channel9.msdn.com/Events/dotnetConf/NET-Conf-2019/B210