Skip to content

Commit 591cca1

Browse files
authored
Merge pull request #258051 from TerryLanfear/sec-231107
new secrets best practices
2 parents 594cb94 + bf37d8b commit 591cca1

File tree

4 files changed

+48
-4
lines changed

4 files changed

+48
-4
lines changed

articles/security/fundamentals/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,8 @@
137137

138138
- name: Data security, encryption, and storage
139139
items:
140+
- name: Best practices for protecting secrets
141+
href: secrets-best-practices.md
140142
- name: Data security and encryption
141143
href: encryption-overview.md
142144
- name: Key management in Azure

articles/security/fundamentals/best-practices-and-patterns.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,31 @@
11
---
22
title: Security best practices and patterns - Microsoft Azure | Microsoft Docs
33
description: This article links you to security best practices and patterns for different Azure resources.
4-
services: security
4+
services: azure-security
55
documentationcenter: na
66
author: TerryLanfear
77
manager: rkarlin
88

99
ms.assetid: 1cbbf8dc-ea94-4a7e-8fa0-c2cb198956c5
1010
ms.service: security
1111
ms.subservice: security-fundamentals
12+
ms.devlang: na
1213
ms.topic: conceptual
1314
ms.tgt_pltfrm: na
1415
ms.workload: na
15-
ms.date: 08/29/2023
16+
ms.date: 11/13/2023
1617
ms.author: terrylan
1718

1819
---
1920
# Azure security best practices and patterns
2021

21-
The articles below contain security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure. These best practices come from our experience with Azure security and the experiences of customers like you.
22+
This article contains security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure. These best practices come from our experience with Azure security and the experiences of customers like you.
2223

23-
The best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
24+
## Best practices
2425

26+
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
27+
28+
* [Best practices for protecting secrets](secrets-best-practices.md)
2529
* [Azure database security best practices](/azure/azure-sql/database/security-best-practice)
2630
* [Azure data security and encryption best practices](data-encryption-best-practices.md)
2731
* [Azure identity management and access control security best practices](identity-management-best-practices.md)
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Best practices for protecting secrets - Microsoft Azure | Microsoft Docs
3+
description: This article links you to security best practices for protecting secrets.
4+
services: security
5+
documentationcenter: na
6+
author: TerryLanfear
7+
manager: rkarlin
8+
9+
ms.assetid: 1cbbf8dc-ea94-4a7e-8fa0-c2cb198956c5
10+
ms.service: security
11+
ms.subservice: security-fundamentals
12+
ms.topic: conceptual
13+
ms.tgt_pltfrm: na
14+
ms.workload: na
15+
ms.date: 11/09/2023
16+
ms.author: terrylan
17+
18+
---
19+
# Best practices for protecting secrets
20+
This article provides guidance on protecting secrets. Follow this guidance to help ensure you do not log sensitive information, such as credentials, into GitHub repositories or continuous integration/continuous deployment (CI/CD) pipelines.
21+
22+
## Best practices
23+
24+
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
25+
26+
- Azure Stack Hub: [Rotate secrets](/azure-stack/operator/azure-stack-rotate-secrets)
27+
- Azure Key Vault: [Centralize storage of application secrets](../../key-vault/general/overview.md)
28+
- Azure Communications Service: [Create and manage access tokens](../../communication-services/quickstarts/identity/access-tokens.md)
29+
- Azure Service Bus: [Authenticate and authorize an application with Microsoft Entra ID to access Azure Service Bus entities](../../service-bus-messaging/authenticate-application.md)
30+
- Azure App Service: [Learn to configure common settings for an App Service application](../../app-service/configure-common.md)
31+
32+
## Next steps
33+
34+
Minimizing security risk is a shared responsibility. You need to be proactive in taking steps to secure your workloads. [Learn more about shared responsibility in the cloud](shared-responsibility.md).
35+
36+
See [Azure security best practices and patterns](best-practices-and-patterns.md) for more security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure.

articles/security/journey/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169,6 +169,8 @@
169169

170170
- name: Data security, encryption, and storage
171171
items:
172+
- name: Best practices for protecting secrets
173+
href: ../fundamentals/secrets-best-practices.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
172174
- name: Azure Certificate Authority details
173175
href: ../fundamentals/azure-CA-details.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
174176
- name: Data security and encryption

0 commit comments

Comments
 (0)