You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/secrets-best-practices.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ai-usage: ai-assisted
15
15
16
16
# Best practices for protecting secrets
17
17
18
-
This article provides guidance on protecting your secrets and reducing the risk of unauthorized access. Follow this guidance to help ensure you do not store sensitive information such as credentials in code, GitHub repositories, logs, continuous integration/continuous deployment (CI/CD) pipelines, and so forth. The guidance in this article is compiled from recommendations of individual services, as well as from the [Microsoft Cloud Security Benchmark](/security/benchmark/overview) (MCSB).
18
+
This article provides guidance on protecting your secrets and reducing the risk of unauthorized access. Follow this guidance to help ensure you do not store sensitive information such as credentials in code, GitHub repositories, logs, continuous integration/continuous deployment (CI/CD) pipelines, and so forth. The guidance in this article is compiled from recommendations of individual services, as well as from the [Microsoft Cloud Security Benchmark](/security/benchmark/azure/introduction) (MCSB).
19
19
20
20
## General best practices
21
21
@@ -53,7 +53,7 @@ Regularly scanning your codebase for embedded secrets can prevent accidental exp
@@ -79,7 +79,7 @@ Secrets are susceptible to leakage or exposure over time. Regularly rotating you
79
79
80
80
See:
81
81
82
-
-[Rotate secrets in Azure Key Vault](/azure/key-vault/secrets/rotate)
82
+
-[Rotate secrets in Azure Key Vault](/azure/key-vault/secrets//tutorial-rotation)
83
83
84
84
### Monitor and log access
85
85
@@ -97,15 +97,15 @@ Reduce the exposure of your secrets by implementing network isolation. Configure
97
97
98
98
See:
99
99
100
-
-[Isolation in the Azure Public Cloud](isolation-choice.md)
100
+
-[Isolation in the Azure Public Cloud](isolation-choices.md)
101
101
102
102
### Encrypt secrets at rest and in transit
103
103
104
104
Ensure that your secrets are encrypted both at rest and in transit. Azure Key Vault automatically encrypts secrets at rest using industry-standard encryption algorithms. Additionally, use secure communication protocols like HTTPS to encrypt data in transit between your applications and the key vault. This approach ensures that your secrets remain protected from unauthorized access during storage and transmission.
105
105
106
106
See:
107
107
108
-
-[Encryption at rest and in transit](encryption.md)
108
+
-[Encryption at rest and in transit](encryption-atrest.md)
109
109
110
110
### Safe Distribution of Secrets
111
111
@@ -116,7 +116,7 @@ When distributing secrets, ensure they are shared securely within and outside th
116
116
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
- Azure Key Vault: [Centralize storage of application secrets](../../key-vault/general/overview.md)
119
+
- Azure Key Vault: [Centralize storage of application secrets](/azure/key-vault/general/overview)
120
120
- Azure Communications Service: [Create and manage access tokens](../../communication-services/quickstarts/identity/access-tokens.md)
121
121
- Azure Service Bus: [Authenticate and authorize an application with Microsoft Entra ID to access Azure Service Bus entities](../../service-bus-messaging/authenticate-application.md)
122
122
- Azure App Service: [Learn to configure common settings for an App Service application](../../app-service/configure-common.md)
0 commit comments