Skip to content

Commit e0d6cd7

Browse files
committed
Updates
1 parent 853f89f commit e0d6cd7

File tree

10 files changed

+17
-4
lines changed

10 files changed

+17
-4
lines changed

articles/key-vault/certificates/about-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,10 +169,10 @@ TLS certificates can help encrypt communications over the internet and establish
169169
A certificate can help secure the code/script of software, thereby ensuring that the author can share the software over the internet without being changed by malicious entities. Furthermore, once the author signs the code using a certificate leveraging the code signing technology, the software is marked with a stamp of authentication displaying the author and their website. Therefore, the certificate used in code signing helps validate the software's authenticity, promoting end-to-end security.
170170

171171
## Next steps
172-
173172
- [About Key Vault](../general/overview.md)
174173
- [About keys, secrets, and certificates](../general/about-keys-secrets-certificates.md)
175174
- [About keys](../keys/about-keys.md)
176175
- [About secrets](../secrets/about-secrets.md)
176+
- [Key management in Azure](../../security/fundamentals/key-management.md)
177177
- [Authentication, requests, and responses](../general/authentication-requests-and-responses.md)
178178
- [Key Vault Developer's Guide](../general/developers-guide.md)

articles/key-vault/certificates/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ items:
6464
href: faq.yml
6565
- name: Multitenancy and Azure Key Vault
6666
href: /azure/architecture/guide/multitenant/service/key-vault
67+
- name: Key management in Azure
68+
href: ../../security/fundamentals/key-management.md
6769
- name: Azure PowerShell
6870
href: /powershell/module/az.keyvault/#key_vault
6971
- name: Azure CLI

articles/key-vault/general/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: mbaldwin
1616
---
1717
# About Azure Key Vault
1818

19-
Azure Key Vault helps solve the following problems:
19+
Azure Key Vault is one of several [key management solutions in Azure](../../security/fundamentals/key-management.md), and helps solve the following problems:
2020

2121
- **Secrets Management** - Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets
2222
- **Key Management** - Azure Key Vault can be used as a Key Management solution. Azure Key Vault makes it easy to create and control the encryption keys used to encrypt your data.
@@ -74,7 +74,7 @@ As a secure store in Azure, Key Vault has been used to simplify scenarios like:
7474
Key Vault itself can integrate with storage accounts, event hubs, and log analytics.
7575

7676
## Next steps
77-
77+
- [Key management in Azure](../../security/fundamentals/key-management.md)
7878
- Learn more about [keys, secrets, and certificates](about-keys-secrets-certificates.md)
7979
- [Quickstart: Create an Azure Key Vault using the CLI](../secrets/quick-create-cli.md)
8080
- [Authentication, requests, and responses](../general/authentication-requests-and-responses.md)

articles/key-vault/general/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,8 @@
163163
href: whats-new.md
164164
- name: Monitoring Key Vault data reference
165165
href: monitor-key-vault-reference.md
166+
- name: Key management in Azure
167+
href: ../../security/fundamentals/key-management.md
166168
- name: Multitenancy and Azure Key Vault
167169
href: /azure/architecture/guide/multitenant/service/key-vault
168170
- name: Client libraries

articles/key-vault/keys/about-keys.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@ See [Key types, algorithms, and operations](about-keys-details.md) for details a
8888
| Keyless TLS | - Use key [Client Libraries](../general/client-libraries.md#client-libraries-per-language-and-object) |
8989

9090
## Next steps
91+
- [Key management in Azure](../../security/fundamentals/key-management.md)
9192
- [About Key Vault](../general/overview.md)
9293
- [About Managed HSM](../managed-hsm/overview.md)
9394
- [About secrets](../secrets/about-secrets.md)

articles/key-vault/keys/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,8 @@ items:
6363
items:
6464
- name: Secure key release policy grammar
6565
href: policy-grammar.md
66+
- name: Key management in Azure
67+
href: ../../security/fundamentals/key-management.md
6668
- name: Multitenancy and Azure Key Vault
6769
href: /azure/architecture/guide/multitenant/service/key-vault
6870
- name: Azure PowerShell

articles/key-vault/managed-hsm/overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ author: msmbaldwin
1616
---
1717
# What is Azure Key Vault Managed HSM?
1818

19-
Azure Key Vault Managed HSM (Hardware Security Module) is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using **FIPS 140-2 Level 3** validated HSMs.
19+
Azure Key Vault Managed HSM (Hardware Security Module) is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using **FIPS 140-2 Level 3** validated HSMs. It is one of several [key management solutions in Azure](../../security/fundamentals/key-management.md).
2020

2121
For pricing information, please see Managed HSM Pools section on [Azure Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/). For supported key types, see [About keys](../keys/about-keys.md).
2222

@@ -55,6 +55,7 @@ For pricing information, please see Managed HSM Pools section on [Azure Key Vaul
5555
- Generate HSM-protected keys in your on-premises HSM and import them securely into Managed HSM.
5656

5757
## Next steps
58+
- [Key management in Azure](../../security/fundamentals/key-management.md)
5859
- See [Quickstart: Provision and activate a managed HSM using Azure CLI](quick-create-cli.md) to create and activate a managed HSM
5960
- See [Best Practices using Azure Key Vault Managed HSM](best-practices.md)
6061
- [Managed HSM Status](https://azure.status.microsoft)

articles/key-vault/managed-hsm/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,8 @@ items:
6060
items:
6161
- name: Secure key release policy grammar
6262
href: policy-grammar.md
63+
- name: Key management in Azure
64+
href: ../../security/fundamentals/key-management.md
6365
- name: Azure PowerShell
6466
href: /powershell/azure#key_vault
6567
- name: Azure CLI

articles/key-vault/secrets/about-secrets.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,7 @@ You can specify additional application-specific metadata in the form of tags. Ke
8989

9090
## Next steps
9191

92+
- [Key management in Azure](../../security/fundamentals/key-management.md)
9293
- [Best practices for secrets management in Key Vault](secrets-best-practices.md)
9394
- [About Key Vault](../general/overview.md)
9495
- [About keys, secrets, and certificates](../general/about-keys-secrets-certificates.md)

articles/key-vault/secrets/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,8 @@ items:
6565
href: secrets-best-practices.md
6666
- name: Reference
6767
items:
68+
- name: Key management in Azure
69+
href: ../../security/fundamentals/key-management.md
6870
- name: Multitenancy and Azure Key Vault
6971
href: /azure/architecture/guide/multitenant/service/key-vault
7072
- name: Azure PowerShell

0 commit comments

Comments
 (0)