In the following example, we will create a storage account and then replace the default […]
Creating a key vault – Building Application Security
Let’s follow these steps for creating a key vault. The following key vault will then […]
Introducing Azure Key Vault – Building Application Security
Encrypting data in some form is a core requirement for many solutions; however, there are […]
Technical requirements – Building Application Security
In the previous chapter, we explained how to manage and control user access through the […]
Publishing and assigning a blueprint – Ensuring Platform Governance
Follow these steps to publish and assign a blueprint: Figure 5.13 – Assigning a blueprint […]
Using policies and initiatives – Ensuring Platform Governance
Using Azure policies involves two steps – first, you define the policy. Then, you assign […]
Managing tags in ARM templates – Ensuring Platform Governance
Finally, we will add tags when we deploy infrastructure using ARM templates.To add tags, we […]
Adding tags manually – Ensuring Platform Governance
When creating resources using the Azure portal, the final screen will allow you to enter […]
Applying tagging – Ensuring Platform Governance
In Chapter 2, Principles of Modern Architecture, we discussed the need for an IT strategy […]
Risk policies – Managing User Authorization
A risk score for a user can change minute by minute, especially for sign-in events, […]