Best practices for using Azure Key Vault (2024)

  • Article

Azure Key Vault safeguards encryption keys and secrets like certificates, connection strings, and passwords. This article helps you optimize your use of key vaults.

Use separate key vaults

Our recommendation is to use a vault per application per environment (development, preproduction, and production), per region. Granular isolation helps you not share secrets across applications, environments and regions, and it also reduce the threat if there is a breach.

Why we recommend separate key vaults

Key vaults define security boundaries for stored secrets. Grouping secrets into the same vault increases the blast radius of a security event because attacks might be able to access secrets across concerns. To mitigate access across concerns, consider what secrets a specific application should have access to, and then separate your key vaults based on this delineation. Separating key vaults by application is the most common boundary. Security boundaries, however, can be more granular for large applications, for example, per group of related services.

Control access to your vault

Encryption keys and secrets like certificates, connection strings, and passwords are sensitive and business critical. You need to secure access to your key vaults by allowing only authorized applications and users. Azure Key Vault security features provides an overview of the Key Vault access model. It explains authentication and authorization. It also describes how to secure access to your key vaults.

Recommendations for controlling access to your vault are as follows:

  • Lock down access to your subscription, resource group, and key vaults using role-based access control (RBAC) permission model for data plane.
    • Assign RBAC roles at Key Vault scope for applications, services, and workloads requiring persistent access to Key Vault
    • Assign just-in-time eligible RBAC roles for operators, administrators, and other user accounts requiring privileged access to Key Vault using Privileged Identity Management (PIM)
      • Require at least one approver
      • Enforce multi-factor authentication
  • Restrict network access with Private Link, firewall and virtual networks

Important

Legacy Access Policies permission model has known security vulnerabilities and lack of Priviliged Identity Management support and should not be used for critical data and workloads.

Turn on data protection for your vault

Turn on purge protection to guard against malicious or accidental deletion of the secrets and key vault even after soft-delete is turned on.

For more information, see Azure Key Vault soft-delete overview.

Turn on logging

Turn on logging for your vault. Also, set up alerts.

Backup

Purge protection prevents malicious and accidental deletion of vault objects for up to 90 days. In scenarios, when purge protection is not a possible option, we recommend backup vault objects, which can't be recreated from other sources like encryption keys generated within the vault.

For more information about backup, see Azure Key Vault backup and restore.

Multitenant solutions and Key Vault

A multitenant solution is built on an architecture where components are used to serve multiple customers or tenants. Multitenant solutions are often used to support software as a service (SaaS) solutions. If you're building a multitenant solution that includes Key Vault, it is recommended to use one Key Vault per customer to provide isolation for customers data and workloads, review Multitenancy and Azure Key Vault.

Frequently Asked Questions:

Can I use Key Vault role-based access control (RBAC) permission model object-scope assignments to provide isolation for application teams within Key Vault?

No. RBAC permission model allows to assign access to individual objects in Key Vault to user or application, but only for read. Any administrative operations like network access control, monitoring, and objects management require vault level permissions. Having one Key Vault per application provides secure isolation for operators across application teams.

Next steps

Learn more about key management best practices:

Best practices for using Azure Key Vault (2024)
Top Articles
Ankr (ANKR) Price Prediction 2023, 2025, 2030 — Is ANKR a Good Investment? - BTCC
Documentary films - Documentary Films Maker | Video Makers
Devin Mansen Obituary
Ffxiv Act Plugin
No Hard Feelings (2023) Tickets & Showtimes
Netr Aerial Viewer
Ofw Pinoy Channel Su
Driving Directions To Fedex
When is streaming illegal? What you need to know about pirated content
How Much Is 10000 Nickels
CHESAPEAKE WV :: Topix, Craigslist Replacement
Tight Tiny Teen Scouts 5
zopiclon | Apotheek.nl
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Walmart Windshield Wiper Blades
Xxn Abbreviation List 2023
Niche Crime Rate
Uktulut Pier Ritual Site
360 Tabc Answers
Atdhe Net
Rs3 Ushabti
The 15 Best Sites to Watch Movies for Free (Legally!)
At 25 Years, Understanding The Longevity Of Craigslist
CVS Health’s MinuteClinic Introduces New Virtual Care Offering
Shelby Star Jail Log
Cowboy Pozisyon
Usa Massage Reviews
Umn Biology
Log in to your MyChart account
Paradise Point Animal Hospital With Veterinarians On-The-Go
What is Software Defined Networking (SDN)? - GeeksforGeeks
Ewg Eucerin
Bj's Tires Near Me
Datingscout Wantmatures
Blush Bootcamp Olathe
Matlab Kruskal Wallis
Craigslist Red Wing Mn
Terrier Hockey Blog
Laurin Funeral Home | Buried In Work
Space Marine 2 Error Code 4: Connection Lost [Solved]
Academic important dates - University of Victoria
Cookie Clicker The Advanced Method
Acts 16 Nkjv
Youravon Com Mi Cuenta
Gander Mountain Mastercard Login
CPM Homework Help
Strawberry Lake Nd Cabins For Sale
Craigslist Psl
Zom 100 Mbti
Competitive Comparison
WHAT WE CAN DO | Arizona Tile
Latest Posts
Article information

Author: Dan Stracke

Last Updated:

Views: 5837

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Dan Stracke

Birthday: 1992-08-25

Address: 2253 Brown Springs, East Alla, OH 38634-0309

Phone: +398735162064

Job: Investor Government Associate

Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.