Skip to content

Commit 7cd3141

Browse files
authored
Update best-practices.md
1 parent 7647057 commit 7cd3141

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/key-vault/general/best-practices.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,10 @@ Encryption keys and secrets like certificates, connection strings, and passwords
3030

3131
Recommendations for controlling access to your vault are as follows:
3232
- Lock down access to your subscription, resource group, and key vaults using role-based access control (RBAC).
33-
- Assign RBAC roles at Key Vault scope for applications, services, and workloads requiring persistent access to Key Vault
34-
- Assign just-in-time eligible RBAC roles for operators, administrators and other user accounts requiring privileged access to Key Vault using [Privileged Identity Management (PIM)](../../active-directory/privileged-identity-management/pim-configure.md)
35-
- Require at least one approver
36-
- Enforce multi-factor authentication
33+
- Assign RBAC roles at Key Vault scope for applications, services, and workloads requiring persistent access to Key Vault
34+
- Assign just-in-time eligible RBAC roles for operators, administrators and other user accounts requiring privileged access to Key Vault using [Privileged Identity Management (PIM)](../../active-directory/privileged-identity-management/pim-configure.md)
35+
- Require at least one approver
36+
- Enforce multi-factor authentication
3737
- Restrict network access with [Private Link](private-link-service.md), [firewall and virtual networks](network-security.md)
3838

3939
## Turn on data protection for your vault

0 commit comments

Comments
 (0)