You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Turn on purge protection to guard against malicious or accidental deletion of the secrets and key vault even after soft-delete is turned on.
52
40
41
+
For more information, see [Azure Key Vault soft-delete overview](soft-delete-overview.md)
53
42
54
43
## Turn on logging
55
44
56
45
[Turn on logging](logging.md) for your vault. Also, [set up alerts](alert.md).
57
46
58
-
## Turn on recovery options
47
+
## Backup
48
+
49
+
Purge protection prevents malicious and accidental deletion of vault objects for up to 90 days. In scenarios when purge protection is not a possible option, we recommend backup vault objects, which can't be recreated from other sources like encryption keys generated within the vault.
59
50
60
-
- Turn on [soft-delete](soft-delete-overview.md).
61
-
- Turn on purge protection if you want to guard against force deletion of the secrets and key vault even after soft-delete is turned on.
51
+
For more information about backup, see [Azure Key Vault backup and restore](backup.md)
62
52
63
53
## Multitenant solutions and Key Vault
64
54
65
55
A multitenant solution is built on an architecture where components are used to serve multiple customers or tenants. Multitenant solutions are often used to support software as a service (SaaS) solutions. If you're building a multitenant solution that includes Key Vault, review [Multitenancy and Azure Key Vault](/azure/architecture/guide/multitenant/service/key-vault).
66
56
57
+
## Frequently Asked Questions:
58
+
### Can I use Key Vault role-based access control (RBAC) permission model object-scope assignments to provide isolation for application teams within Key Vault?
59
+
No. RBAC permission model allows to assign access to individual objects in Key Vault to user or application, but any administrative operations like network access control, monitoring, and objects management require vault level permissions which will then expose secure information to operators across application teams.
60
+
67
61
## Learn more
68
62
-[Best practices for secrets management in Key Vault](../secrets/secrets-best-practices.md)
0 commit comments