Key and secret management considerations in Azure

Encryption is an essential tool for security because it restricts access. However, it's equally important to protect the secrets (keys, certificates) key that provide access to the data.

Key points

  • Use identity-based access control instead of cryptographic keys.
  • Store keys and secrets in managed key vault service. Control permissions with an access model.
  • Rotate keys and other secrets frequently. Replace secrets at the end their lifetime or if they have been compromised.

Identity-based access control

There are many ways to provide access control over storage resources available, such as shared keys, shared signatures, anonymous access, and identity provider-based methods.

Do you prioritize authentication through identity services for a workload over cryptographic keys?


Protecting cryptographic keys can often get overlooked or implemented poorly. Managing keys securely with application code is especially difficult and can lead to mistakes such as accidentally publishing sensitive access keys to public code repositories.

Use of identity-based option for storage access control is recommended. This option uses role-based access controls (RBAC) over storage resources. Use RBAC to assign permissions to users, groups, and applications at a certain scope. Identity systems such as Azure Active Directory(Azure AD) offer secure and usable experience for access control with built-in mechanisms for handling key rotation, monitoring for anomalies, and others.

Task Grant access based on the principle of least privilege. Risk of giving more privileges than necessary can lead to data compromise.

Suppose you need to store sensitive data in Azure Blob Storage. You can use Azure AD and RBAC to authenticate a service principal that has the required permissions to access the storage. For more information about the feature, see Authorize access to blobs and queues using Azure Active Directory.

Tip

Using SAS tokens is a common way to control access. These SAS tokens created by using the service owner's Azure AD credentials. The tokens are created per resource and you can use Azure RBAC to restrict access. SAS tokens have a time limit, which controls the window of exposure. Here are the resources for the preceding example:

GitHub logo GitHub: Azure Cognitive Services Reference Implementation.

The design considerations are described in Speech transcription with Azure Cognitive Services.

Key storage

Store all application keys and secrets in managed key vault service such as Azure Key Vault. Data encryption keys are often encrypted with a key encryption key in Azure Key Vault to further limit access.

Make sure that no keys and secrets for any environment types (Dev/Test, or production) are stored in application configuration files or CI/CD pipelines. Developers can use Visual Studio Connected Services or local-only files to access credentials.

Have processes that periodically detect exposed keys in your application code. An option is Credential Scanner. For information about configuring task, see Credential Scanner task.

Do you have an access model for key vaults to grant access to keys and secrets?


To secure access to your key vaults, control permissions to keys and secrets an access model. For more information, see Access model overview.

Operational considerations

Who is responsible to manage the keys and secrets in the application context?


Central SecOps team provides guidance on how keys and secrets are managed (governance). Application DevOps team is responsible for managing the application-related keys and secrets.

What types of keys and secrets are used and how are those generated?


There are various approaches that the workload team uses. Options include Microsoft-managed Keys, Customer-managed Keys, Bring Your Own Key. The decision is often driven by security, compliance and specific data classification requirements. Have a clear understanding these requirements to determine the most suitable type of keys.

Are keys and secrets rotated frequently?


Key rotation reduces the attack vectors and should be automated and executed without any human interactions.

What mechanisms are in place for replacing secrets if needed?


Replace secrets after they have reached the end of their active lifetime or if they have been compromised. Renewed certificates should also use a new key. Have a process for situations where keys get compromised (leaked) and need to be regenerated on-demand. For example, secrets rotation in SQL Database.

Next steps

Protect data at rest and in transit through encryption. Make sure you use standard encryption algorithms.

Identity and access management services authenticate and grant permission to users, partners, customers, applications, services, and other entities. For security considerations, see Azure identity and access management considerations.

Back to the main article: Data protection