Skip to content

Commit bf37d8b

Browse files
committed
adding H2s
1 parent 869f736 commit bf37d8b

File tree

2 files changed

+10
-4
lines changed

2 files changed

+10
-4
lines changed

articles/security/fundamentals/best-practices-and-patterns.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,17 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 11/07/2023
16+
ms.date: 11/13/2023
1717
ms.author: terrylan
1818

1919
---
2020
# Azure security best practices and patterns
2121

22-
The articles below contain security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure. These best practices come from our experience with Azure security and the experiences of customers like you.
22+
This article contains security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure. These best practices come from our experience with Azure security and the experiences of customers like you.
2323

24-
The best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
24+
## Best practices
25+
26+
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
2527

2628
* [Best practices for protecting secrets](secrets-best-practices.md)
2729
* [Azure database security best practices](/azure/azure-sql/database/security-best-practice)

articles/security/fundamentals/secrets-best-practices.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,11 @@ ms.author: terrylan
1717

1818
---
1919
# Best practices for protecting secrets
20-
The articles below provide guidance on protecting secrets. Follow this guidance to help ensure you do not log sensitive information, such as credentials, into GitHub repositories or continuous integration/continuous deployment (CI/CD) pipelines.
20+
This article provides guidance on protecting secrets. Follow this guidance to help ensure you do not log sensitive information, such as credentials, into GitHub repositories or continuous integration/continuous deployment (CI/CD) pipelines.
21+
22+
## Best practices
23+
24+
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
2125

2226
- Azure Stack Hub: [Rotate secrets](/azure-stack/operator/azure-stack-rotate-secrets)
2327
- Azure Key Vault: [Centralize storage of application secrets](../../key-vault/general/overview.md)

0 commit comments

Comments
 (0)