Summary
This chapter covered three tools in Azure that can help secure our applications, particularly around managing data encryption keys and authentication between systems.
We looked at how to use key vaults for creating and managing secrets and keys and how we can then secure access to them using Access policies. We also looked at how we can use security principals and managed identities to secure our applications.
This chapter also concluded the Identity and Security requirement of the AZ-304 exam, looking at authentication, authorization, system governance, and application-level security.
Next, we will look at how we architect solutions around specific Azure infrastructure and storage components.