Chapter 6: Building Application Security
In the previous chapter, we explained how to manage and control user access through the use of management groups, policies, and Azure Blueprints.
In Chapter 2, Principles of Modern Architecture, we also discussed the need for security in depth – that is, the need for multiple layers of security to protect us in the event one layer is compromised.
Two such additional areas of control involve the encryption of data and the security of communications between services. This has become more important in recent years due to the increased use of microservice architectures that demand multiple smaller services, working together and transferring data between them.
Encryption of data is often performed using either SSL/TLS certificates or encryption keys and is applied while at rest or in transit.
Another data protection mechanism is how we control and authenticate between one system and another. One example is a website communicating with...