SlideShare a Scribd company logo
LET'S START!
SERVICES FOR
STORING SECRETS
Expert in full-stack development and AWS
Proficient in modern technologies including ReactJS, NodeJS,
GraphQL, TypeScript
In-depth knowledge of cloud cost optimization techniques
and strategies
Proven experience in cloud migration and deployment
Skilled in cloud security and data management
Familiar with cloud monitoring and analytics tools, such as
Amazon CloudWatch
Knowledge of cloud resource management tools, such as AWS
Auto Scaling or Kubernetes
Experienced with cloud-based storage solutions, such as
Amazon S3 or Google Cloud Storage
About Speaker
Azure Services
By leveraging Azure services for secrets storage, organizations can
achieve several benefits, including:
Security
Azure provides robust security features to
protect secrets, including encryption at rest
and in transit, access controls, and monitoring
capabilities.
Compliance
Azure services for secrets storage comply with
industry standards, including HIPAA, GDPR, and
PCI-DSS, making it easier for organizations to
meet their compliance obligations.
Scalability
Azure services are designed to be scalable,
allowing organizations to store and manage
secrets as their needs grow and evolve.
Flexibility
Azure offers a range of services for secrets
storage, allowing organizations to choose the
service that best meets their specific needs
and requirements.
1.1 Azure Key Vault
1.2 Azure Key Vault
After you can update the policy configuration. Where you can define who has access to what.
After you create a Vault you can start adding keys.
1.2 Azure Key Vault
Secrets
Managing SSL/TLS
certificates
Azure Key Vault can be used to
manage SSL/TLS certificates used
in web applications, APIs, and
other services.
Storage Account
Azure Storage provides a
secure and scalable way to
store data in the cloud.
You can use it to store
secrets in a storage
account, which provides
encryption at rest and in
transit.
2.1 Azure Managed Identity
Is a service that provides an automatically managed identity for your
Azure resources.
And it consists of:
System Assigned
1.
2.2 Azure Managed Identity
Is a service that provides an automatically managed identity for your
Azure resources.
And it consists of:
2. User-assigned manage identity
So here are main differences:
Azure App Configuration
Contact us
We will be glad to answer on any questions!
Liudmyla Dziubynska
CTO at Zenbit Tech
Scan the QR-Code to get Lyudmila's
contacts and link to our Cloud
Solutions Hub LinkedIn Group!
Join our Cloud Solutions Hub LinkedIn Group!

More Related Content

Similar to Service for Storing Secrets on Microsoft Azure.pdf

Azure Developer Roadmap By Scholarhat PDF
Azure Developer Roadmap By Scholarhat PDFAzure Developer Roadmap By Scholarhat PDF
Azure Developer Roadmap By Scholarhat PDF
Scholarhat
 
7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure
Nuvento Systems Pvt Ltd
 
Azure Cloud Services
Azure Cloud ServicesAzure Cloud Services
Azure Cloud Services
Kajal Kathrotiya
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Alert Logic
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
Sparity1
 
Azure bootcamp (1)
Azure bootcamp (1)Azure bootcamp (1)
Azure bootcamp (1)
AmnaHussain26
 
Architecting for Greater Security - London Summit Enteprise Track RePlay
Architecting for Greater Security - London Summit Enteprise Track RePlayArchitecting for Greater Security - London Summit Enteprise Track RePlay
Architecting for Greater Security - London Summit Enteprise Track RePlay
Amazon Web Services
 
Project.pptx
Project.pptxProject.pptx
Project.pptx
20CE112YASHPATEL
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Reena Harnal
 
Azure Day 1.pptx
Azure Day 1.pptxAzure Day 1.pptx
Azure Day 1.pptx
masbulosoke
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
ShivamSharma909
 
What Are The Benefits Of AWS Security.pdf
What Are The Benefits Of AWS Security.pdfWhat Are The Benefits Of AWS Security.pdf
What Are The Benefits Of AWS Security.pdf
Bytecode Security
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introduction
Lalit Rawat
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Cloud 101: Your Gateway to Computing Freedom With AWS
Cloud 101: Your Gateway to Computing Freedom With AWSCloud 101: Your Gateway to Computing Freedom With AWS
Cloud 101: Your Gateway to Computing Freedom With AWS
Shivanshi Singh
 
MS Azure solutions to their employers or clients
MS Azure solutions to their employers or clientsMS Azure solutions to their employers or clients
MS Azure solutions to their employers or clients
manuipattar
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Cryptzone
 

Similar to Service for Storing Secrets on Microsoft Azure.pdf (20)

Azure Developer Roadmap By Scholarhat PDF
Azure Developer Roadmap By Scholarhat PDFAzure Developer Roadmap By Scholarhat PDF
Azure Developer Roadmap By Scholarhat PDF
 
7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure7 Advantages of Migrating to Microsoft Azure
7 Advantages of Migrating to Microsoft Azure
 
Azure Cloud Services
Azure Cloud ServicesAzure Cloud Services
Azure Cloud Services
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Top 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdfTop 10 cloud security tools to adopt in 2024.pdf
Top 10 cloud security tools to adopt in 2024.pdf
 
Azure bootcamp (1)
Azure bootcamp (1)Azure bootcamp (1)
Azure bootcamp (1)
 
Architecting for Greater Security - London Summit Enteprise Track RePlay
Architecting for Greater Security - London Summit Enteprise Track RePlayArchitecting for Greater Security - London Summit Enteprise Track RePlay
Architecting for Greater Security - London Summit Enteprise Track RePlay
 
Project.pptx
Project.pptxProject.pptx
Project.pptx
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Azure Day 1.pptx
Azure Day 1.pptxAzure Day 1.pptx
Azure Day 1.pptx
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
What Are The Benefits Of AWS Security.pdf
What Are The Benefits Of AWS Security.pdfWhat Are The Benefits Of AWS Security.pdf
What Are The Benefits Of AWS Security.pdf
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introduction
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Cloud 101: Your Gateway to Computing Freedom With AWS
Cloud 101: Your Gateway to Computing Freedom With AWSCloud 101: Your Gateway to Computing Freedom With AWS
Cloud 101: Your Gateway to Computing Freedom With AWS
 
MS Azure solutions to their employers or clients
MS Azure solutions to their employers or clientsMS Azure solutions to their employers or clients
MS Azure solutions to their employers or clients
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 

More from Zen Bit Tech

Disaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdfDisaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdf
Zen Bit Tech
 
Services for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdfServices for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdf
Zen Bit Tech
 
Cloud Migration.pdf
Cloud Migration.pdfCloud Migration.pdf
Cloud Migration.pdf
Zen Bit Tech
 
Protect your Data on AWS using the Encryption method.pdf
Protect your Data on AWS using the Encryption method.pdfProtect your Data on AWS using the Encryption method.pdf
Protect your Data on AWS using the Encryption method.pdf
Zen Bit Tech
 
AWS Cost Optimization.pdf
AWS Cost Optimization.pdfAWS Cost Optimization.pdf
AWS Cost Optimization.pdf
Zen Bit Tech
 
Building a GDPR-compliant architecture on AWS.pdf
Building a GDPR-compliant architecture on AWS.pdfBuilding a GDPR-compliant architecture on AWS.pdf
Building a GDPR-compliant architecture on AWS.pdf
Zen Bit Tech
 

More from Zen Bit Tech (6)

Disaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdfDisaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdf
 
Services for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdfServices for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdf
 
Cloud Migration.pdf
Cloud Migration.pdfCloud Migration.pdf
Cloud Migration.pdf
 
Protect your Data on AWS using the Encryption method.pdf
Protect your Data on AWS using the Encryption method.pdfProtect your Data on AWS using the Encryption method.pdf
Protect your Data on AWS using the Encryption method.pdf
 
AWS Cost Optimization.pdf
AWS Cost Optimization.pdfAWS Cost Optimization.pdf
AWS Cost Optimization.pdf
 
Building a GDPR-compliant architecture on AWS.pdf
Building a GDPR-compliant architecture on AWS.pdfBuilding a GDPR-compliant architecture on AWS.pdf
Building a GDPR-compliant architecture on AWS.pdf
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Service for Storing Secrets on Microsoft Azure.pdf

  • 2. Expert in full-stack development and AWS Proficient in modern technologies including ReactJS, NodeJS, GraphQL, TypeScript In-depth knowledge of cloud cost optimization techniques and strategies Proven experience in cloud migration and deployment Skilled in cloud security and data management Familiar with cloud monitoring and analytics tools, such as Amazon CloudWatch Knowledge of cloud resource management tools, such as AWS Auto Scaling or Kubernetes Experienced with cloud-based storage solutions, such as Amazon S3 or Google Cloud Storage About Speaker
  • 3. Azure Services By leveraging Azure services for secrets storage, organizations can achieve several benefits, including: Security Azure provides robust security features to protect secrets, including encryption at rest and in transit, access controls, and monitoring capabilities. Compliance Azure services for secrets storage comply with industry standards, including HIPAA, GDPR, and PCI-DSS, making it easier for organizations to meet their compliance obligations. Scalability Azure services are designed to be scalable, allowing organizations to store and manage secrets as their needs grow and evolve. Flexibility Azure offers a range of services for secrets storage, allowing organizations to choose the service that best meets their specific needs and requirements.
  • 5. 1.2 Azure Key Vault After you can update the policy configuration. Where you can define who has access to what.
  • 6. After you create a Vault you can start adding keys. 1.2 Azure Key Vault
  • 8. Managing SSL/TLS certificates Azure Key Vault can be used to manage SSL/TLS certificates used in web applications, APIs, and other services.
  • 9. Storage Account Azure Storage provides a secure and scalable way to store data in the cloud. You can use it to store secrets in a storage account, which provides encryption at rest and in transit.
  • 10. 2.1 Azure Managed Identity Is a service that provides an automatically managed identity for your Azure resources. And it consists of: System Assigned 1.
  • 11. 2.2 Azure Managed Identity Is a service that provides an automatically managed identity for your Azure resources. And it consists of: 2. User-assigned manage identity
  • 12. So here are main differences:
  • 14. Contact us We will be glad to answer on any questions! Liudmyla Dziubynska CTO at Zenbit Tech Scan the QR-Code to get Lyudmila's contacts and link to our Cloud Solutions Hub LinkedIn Group! Join our Cloud Solutions Hub LinkedIn Group!