Skip to content

Commit 4bb8fdb

Browse files
Merge pull request #276215 from jlichwa/patch-114
Update best-practices.md
2 parents d1e2851 + e7ad431 commit 4bb8fdb

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/key-vault/general/best-practices.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Azure Key Vault safeguards encryption keys and secrets like certificates, connec
1818

1919
## Use separate key vaults
2020

21-
Our recommendation is to use a vault per application per environment (development, pre-production, and production), per region. Granular isolation helps you not share secrets across applications, environments and regions, and it also reduce the threat if there is a breach.
21+
Our recommendation is to use a vault per application per environment (development, preproduction, and production), per region. Granular isolation helps you not share secrets across applications, environments and regions, and it also reduce the threat if there is a breach.
2222

2323
### Why we recommend separate key vaults
2424

@@ -29,18 +29,20 @@ Key vaults define security boundaries for stored secrets. Grouping secrets into
2929
Encryption keys and secrets like certificates, connection strings, and passwords are sensitive and business critical. You need to secure access to your key vaults by allowing only authorized applications and users. [Azure Key Vault security features](security-features.md) provides an overview of the Key Vault access model. It explains authentication and authorization. It also describes how to secure access to your key vaults.
3030

3131
Recommendations for controlling access to your vault are as follows:
32-
- Lock down access to your subscription, resource group, and key vaults using role-based access control (RBAC).
32+
- Lock down access to your subscription, resource group, and key vaults using role-based access control (RBAC) permission model for data plane.
3333
- Assign RBAC roles at Key Vault scope for applications, services, and workloads requiring persistent access to Key Vault
34-
- Assign just-in-time eligible RBAC roles for operators, administrators and other user accounts requiring privileged access to Key Vault using [Privileged Identity Management (PIM)](../../active-directory/privileged-identity-management/pim-configure.md)
34+
- Assign just-in-time eligible RBAC roles for operators, administrators, and other user accounts requiring privileged access to Key Vault using [Privileged Identity Management (PIM)](../../active-directory/privileged-identity-management/pim-configure.md)
3535
- Require at least one approver
3636
- Enforce multi-factor authentication
3737
- Restrict network access with [Private Link](private-link-service.md), [firewall and virtual networks](network-security.md)
38+
> [!IMPORTANT]
39+
> Legacy Access Policies permission model has known security vulnerabilities and lack of Priviliged Identity Management support and should not be used for critical data and workloads.
3840
3941
## Turn on data protection for your vault
4042

4143
Turn on purge protection to guard against malicious or accidental deletion of the secrets and key vault even after soft-delete is turned on.
4244

43-
For more information, see [Azure Key Vault soft-delete overview](soft-delete-overview.md)
45+
For more information, see [Azure Key Vault soft-delete overview](soft-delete-overview.md).
4446

4547
## Turn on logging
4648

@@ -50,11 +52,11 @@ For more information, see [Azure Key Vault soft-delete overview](soft-delete-ove
5052

5153
Purge protection prevents malicious and accidental deletion of vault objects for up to 90 days. In scenarios, when purge protection is not a possible option, we recommend backup vault objects, which can't be recreated from other sources like encryption keys generated within the vault.
5254

53-
For more information about backup, see [Azure Key Vault backup and restore](backup.md)
55+
For more information about backup, see [Azure Key Vault backup and restore](backup.md).
5456

5557
## Multitenant solutions and Key Vault
5658

57-
A multitenant solution is built on an architecture where components are used to serve multiple customers or tenants. Multitenant solutions are often used to support software as a service (SaaS) solutions. If you're building a multitenant solution that includes Key Vault, review [Multitenancy and Azure Key Vault](/azure/architecture/guide/multitenant/service/key-vault).
59+
A multitenant solution is built on an architecture where components are used to serve multiple customers or tenants. Multitenant solutions are often used to support software as a service (SaaS) solutions. If you're building a multitenant solution that includes Key Vault, it is recommended to use one Key Vault per customer to provide isolation for customers data and workloads, review [Multitenancy and Azure Key Vault](/azure/architecture/guide/multitenant/service/key-vault).
5860

5961
## Frequently Asked Questions:
6062
### Can I use Key Vault role-based access control (RBAC) permission model object-scope assignments to provide isolation for application teams within Key Vault?

0 commit comments

Comments
 (0)