You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix security best practice accuracy and model practices in procedural content
Accuracy fixes in secure-*.md best practice articles:
- secure-keys.md: Fix key rotation interval from 'annually' to 'every two years'
to match source of truth (how-to-configure-key-rotation.md line 19)
- secure-keys.md: Replace unsourced BYOK FIPS level claim with link to
supported HSM vendor list
- secure-secrets.md: Replace unsourced '60 days' rotation mandate with
guidance to follow org security policy (60-90 days as example)
- secure-secrets.md: Replace unsourced '8 hours' cache mandate with
general caching guidance linked to throttling article
- secure-keys.md, secure-secrets.md: Remove deprecated tags: metadata
- secure-certificates.md: Update ms.date
Security practice compliance in procedural content:
- keys/quick-create-bicep.md: Add enablePurgeProtection: true (was missing
despite being a documented best practice)
- keys/quick-create-template.md: Add enablePurgeProtection: true
- secrets/quick-create-bicep.md: Add IMPORTANT note that external template
uses legacy access policies; link to RBAC-compliant template
- secrets/quick-create-template.md: Same RBAC warning note added
Metadata cleanup:
- Remove deprecated tags: field from 5 files (tutorial-rotation,
tutorial-rotation-dual, quick-create-template, how-to-configure-key-rotation)
- Update ms.date on all modified files
Co-authored-by: Copilot <[email protected]>
Copy file name to clipboardExpand all lines: articles/key-vault/keys/secure-keys.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,11 @@
2
2
title: Secure your Azure Key Vault keys
3
3
description: Learn how to secure Azure Key Vault keys, with best practices specific to cryptographic key management.
4
4
author: msmbaldwin
5
-
tags: azure-key-vault
6
5
ms.service: azure-key-vault
7
6
ms.subservice: keys
8
7
ms.topic: best-practice
9
8
ms.custom: horz-security
10
-
ms.date: 04/09/2026
9
+
ms.date: 04/10/2026
11
10
ms.author: mbaldwin
12
11
ai-usage: ai-assisted
13
12
# Customer intent: As a developer using Key Vault keys, I want to implement key-specific security best practices.
@@ -48,7 +47,7 @@ For more information about key operations, see [Key operations in Key Vault](abo
48
47
Implement regular key rotation to limit exposure from compromised keys:
49
48
50
49
-**Enable automatic key rotation**: Configure automatic rotation policies to rotate keys without application downtime. See [Configure key autorotation](how-to-configure-key-rotation.md)
51
-
-**Set rotation frequency**: Rotate encryption keys at least annually, or more frequently based on compliance requirements
50
+
-**Set rotation frequency**: Rotate encryption keys at least every two years, or more frequently based on compliance requirements
52
51
-**Use key versioning**: Key Vault automatically versions keys, allowing seamless rotation without breaking existing encrypted data
53
52
-**Plan for re-encryption**: For long-term data, implement strategies to re-encrypt data with new key versions
54
53
@@ -67,7 +66,7 @@ Protect against data loss by implementing proper backup and recovery procedures:
67
66
68
67
When importing your own keys into Key Vault, follow security best practices:
69
68
70
-
-**Use secure key generation**: Generate keys in FIPS 140-2 Level 2 or higher HSMs
69
+
-**Use secure key generation**: Generate keys in a [supported on-premises HSM](hsm-protected-keys.md) that meets your compliance requirements
71
70
-**Protect keys during transfer**: Use Key Vault's BYOK process to securely transfer keys. See [Import HSM-protected keys to Key Vault (BYOK)](hsm-protected-keys-byok.md)
72
71
-**Validate key import**: Verify key attributes and permissions after import
73
72
-**Maintain key provenance**: Document the origin and transfer method of imported keys
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure.
@@ -48,6 +48,9 @@ ms.author: mbaldwin
48
48
49
49
## Review the Bicep file
50
50
51
+
> [!IMPORTANT]
52
+
> This quickstart uses an external template that creates a vault with legacy access policies. For production deployments, use Azure RBAC authorization instead. See [Create an Azure key vault and a key by using Bicep](../keys/quick-create-bicep.md) for a Bicep template that uses `enableRbacAuthorization: true`, or see [Secure your Azure Key Vault](../general/secure-key-vault.md) for comprehensive security guidance.
53
+
51
54
The template used in this quickstart is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/key-vault-create/).
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure.
14
13
---
@@ -54,6 +53,9 @@ To complete this article:
54
53
55
54
## Review the template
56
55
56
+
> [!IMPORTANT]
57
+
> This quickstart uses an external template that creates a vault with legacy access policies. For production deployments, use Azure RBAC authorization instead. See [Create a key vault using an ARM template](../general/vault-create-template.md) for a template that uses `enableRbacAuthorization: true`, or see [Secure your Azure Key Vault](../general/secure-key-vault.md) for comprehensive security guidance.
58
+
57
59
The template used in this quickstart is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/key-vault-create/).
Copy file name to clipboardExpand all lines: articles/key-vault/secrets/secure-secrets.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,11 @@
2
2
title: Secure your Azure Key Vault secrets
3
3
description: Learn how to secure Azure Key Vault secrets, with best practices specific to secrets management.
4
4
author: msmbaldwin
5
-
tags: azure-key-vault
6
5
ms.service: azure-key-vault
7
6
ms.subservice: secrets
8
7
ms.topic: best-practice
9
8
ms.custom: horz-security
10
-
ms.date: 11/10/2025
9
+
ms.date: 04/10/2026
11
10
ms.author: mbaldwin
12
11
ai-usage: ai-assisted
13
12
# Customer intent: As a developer using Key Vault secrets, I want to implement secrets-specific security best practices.
@@ -50,7 +49,7 @@ When storing secrets in Key Vault, follow these formatting best practices:
50
49
51
50
Secrets stored in application memory or configuration files persist for the entire application lifecycle, increasing exposure risk. Implement regular secret rotation to minimize compromise risk:
52
51
53
-
-**Rotate secrets regularly**: Rotate secrets at least every 60 days, or more frequently for high-security scenarios
52
+
-**Rotate secrets regularly**: Rotate secrets frequently based on your organization's security policy and the sensitivity of the credential. Shorter rotation intervals (for example, 60-90 days) reduce exposure risk from compromised secrets.
54
53
-**Automate rotation**: Use Azure Key Vault's rotation capabilities to automate the rotation process
55
54
-**Use dual credentials**: For zero-downtime rotation, implement resources with two sets of authentication credentials
56
55
@@ -62,12 +61,10 @@ For more information about secrets rotation, see:
62
61
63
62
Key Vault enforces service limits to prevent abuse. To optimize secrets access while maintaining security:
64
63
65
-
-**Cache secrets in memory**: Cache secrets in your application for at least 8 hours to reduce Key Vault API calls
64
+
-**Cache secrets in memory**: Cache secrets in your application to reduce Key Vault API calls and avoid throttling. Reuse cached values whenever possible and refresh them when secrets are rotated. For more information, see [Azure Key Vault throttling guidance](../general/overview-throttling.md).
66
65
-**Implement retry logic**: Use exponential back-off retry logic to handle transient failures and throttling
67
66
-**Refresh on rotation**: Update cached values when secrets are rotated to ensure applications use current credentials
68
67
69
-
For more information about throttling, see [Azure Key Vault throttling guidance](../general/overview-throttling.md).
70
-
71
68
## Secrets monitoring
72
69
73
70
Enable monitoring to track secret access patterns and detect potential security issues:
0 commit comments