Overview
Syllabus
Intro
The threat of data breaches Cryptography overview Key management options Introducing Azure Key Vault HSM Patterns and Practices
Data Breaches are Inevitable
Don't Just Focus on Perimeter Security
aws AWS HSM & AWS KMS
Once a Key goes in the Key Vault, it never comes out again
Keys vs Secrets
Multiple Vaults for Environments
NEVER share keys from production in any other environment
Secrets are versioned in the Key Vault
Salted Hash Passwords
A digital is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document
Taught by
NDC Conferences