7: Implement secure Azure solutions

InexpensiveTaiga avatar
InexpensiveTaiga
·
·
Download

Start Quiz

Study Flashcards

22 Questions

What types of containers does Azure Key Vault service support?

Vaults and managed HSM pools

What does the Premium tier of Azure Key Vault include?

Hardware security module(HSM)-protected keys

What kind of information can be securely stored in Azure Key Vault?

Tokens, passwords, certificates, API keys, and other secrets

How does centralizing storage of application secrets in Azure Key Vault benefit applications?

It allows control of their distribution and secure access using URIs

What is used for authentication when accessing a key vault?

Microsoft Entra ID

When is Azure RBAC used in relation to key vaults?

Dealing with the management of the vaults

How can Azure Key Vault logs be managed?

Logs can be secured by restricting access and deleted when no longer needed

What does the Azure Key Vault Premium tier provide for hardware protection?

Hardware security modules (HSMs)

How is authentication done for accessing a key vault?

Via Microsoft Entra ID

When is Azure RBAC used in relation to key vaults?

For management of the vaults

How can Azure Key Vaults be configured to simplify administration of application secrets?

By ensuring security information follows a life cycle and is highly available

What is used to hardware-protect Azure Key Vaults in the Premium tier?

Hardware security modules (HSMs)

What is a secret in the context of Azure Key Vault?

API keys, passwords, or certificates

How many ways are there to authenticate to Azure Key Vault?

Three

What does Azure Key Vault enforce to protect data in transit?

Transport Layer Security (TLS) protocol

What does Perfect Forward Secrecy (PFS) protect connections with?

Unique keys

What encryption key lengths are used for connections to Azure Key Vault?

RSA-based 2,048-bit

What is the main purpose of Azure Key Vault?

Securely storing and accessing secrets

What is a vault in the context of Azure Key Vault?

Logical group of secrets

What is the recommended practice for using Azure Key Vault with different environments?

Create a separate vault for each application in each environment

How should access to Azure Key Vaults be controlled?

Allow only authorized applications and users

What is the recommended action for guarding against force deletion of a secret in Azure Key Vault?

Turn on soft-delete and purge protection

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser