Best practices for protecting secrets
This article provides guidance on protecting secrets. Follow this guidance to help ensure you do not log sensitive information, such as credentials, into GitHub repositories or continuous integration/continuous deployment (CI/CD) pipelines.
Best practices
These best practices are intended to be a resource for IT pros. This might include designers, architects, developers, and testers who build and deploy secure Azure solutions.
- Azure Stack Hub: Rotate secrets
- Azure Key Vault: Centralize storage of application secrets
- Azure Communications Service: Create and manage access tokens
- Azure Service Bus: Authenticate and authorize an application with Microsoft Entra ID to access Azure Service Bus entities
- Azure App Service: Learn to configure common settings for an App Service application
- Azure Pipelines: Protecting secrets in Azure Pipelines
Next steps
Minimizing security risk is a shared responsibility. You need to be proactive in taking steps to secure your workloads. Learn more about shared responsibility in the cloud.
See Azure security best practices and patterns for more security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure.
Feedback
https://aka.ms/ContentUserFeedback.
Disponibbli dalwaqt: Matul l-2024 se nkunu qed inwaqqfu gradwalment Problemi GitHub bħala l-mekkaniżmu ta’ feedback għall-kontenut u se nibdluh b’sistema ġdida ta’ feedback. Għal aktar informazzjoni, ara:Issottometti u ara feedback għal