Skip to content

Commit 5b5211f

Browse files
authored
Merge pull request #120422 from rudolfdraijer/patch-3
Update best-practices.md
2 parents c0b47fb + ad80099 commit 5b5211f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/key-vault/managed-hsm/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Managed HSM is a cloud service that safeguards cryptographic keys. Because these
2323

2424
To control access to your managed HSM:
2525

26-
- Create an [Microsoft Entra security group](../../active-directory/fundamentals/active-directory-manage-groups.md) for the HSM Administrators (instead of assigning the Administrator role to individuals) to prevent "administration lockout" if an individual account is deleted.
26+
- Create a [Microsoft Entra security group](../../active-directory/fundamentals/active-directory-manage-groups.md) for the HSM Administrators (instead of assigning the Administrator role to individuals) to prevent "administration lockout" if an individual account is deleted.
2727
- Lock down access to your management groups, subscriptions, resource groups, and managed HSMs. Use Azure role-based access control (Azure RBAC) to control access to your management groups, subscriptions, and resource groups.
2828
- Create per-key role assignments by using [Managed HSM local RBAC](access-control.md#data-plane-and-managed-hsm-local-rbac).
2929
- To maintain separation of duties, avoid assigning multiple roles to the same principals.

0 commit comments

Comments
 (0)