The first step we need to perform is creating a service principal and generating a […]
Access policies – Building Application Security
Access policies can be assigned to users, security principals, managed identities, and applications. Each policy […]
Using Key Vault keys – Building Application Security
In the following example, we will create a storage account and then replace the default […]
Creating a key vault – Building Application Security
Let’s follow these steps for creating a key vault. The following key vault will then […]
Introducing Azure Key Vault – Building Application Security
Encrypting data in some form is a core requirement for many solutions; however, there are […]
Assigning an initiative – Ensuring Platform Governance
Follow these steps to assign an initiative: These policies will now take effect, but only […]
Policy rules – Ensuring Platform Governance
Finally, we must define the actual rule, and this is performed by creating an if-then […]
Using policies and initiatives – Ensuring Platform Governance
Using Azure policies involves two steps – first, you define the policy. Then, you assign […]
Managing tags in ARM templates – Ensuring Platform Governance
Finally, we will add tags when we deploy infrastructure using ARM templates.To add tags, we […]
Managing risk with Identity Protection – Managing User Authorization
To further support security for users, Microsoft employs an AI-based system for monitoring risky sign-ins. […]