Microsoft KeyVault
Best practices and references below are based on published guidance from the cloud service provider and may reference native capabilities the cloud service provider offers. If you are not using the native security capabilities, the same security requirement can be met using other security capabilities your organization utilizes
Design Guidance:
Tags |
Name | ||
Tags |
Tags |
Sku-Name |
Access Policies | ||
Access Policies-Tenant Id | ||
Access Policies-Object Id | ||
Access Policies-Application Id | ||
Access Policies-Permissions | ||
Enabled For Deployment | ||
Enabled For Disk Encryption | ||
Enabled For Template Deployment |
Access Policies | |
Access Policies-Tenant Id | |
Access Policies-Object Id | |
Access Policies-Application Id |
Design Guidance:
Enable Soft Delete | ||
Create Mode | ||
Soft Delete Retention In Days |
Content Type | ||
Attributes | ||
Attributes-Enabled | ||
Attributes-Nbf | ||
Attributes-Exp |
Design Guidance:
Enable Rbac Authorization |
Network Acls-Bypass | ||
Ip Rules-Value | ||
Network Acls-Virtual Network Rules |
Design Guidance:
Network Acls-Default Action |
Design Guidance:
Name | |
Attributes-Enabled | |
Curve Name | |
Key Size | |
Key Ops | |
Kty |
Attributes-Exp | |
Attributes-Nbf |
Last modified 1yr ago