Which of the following is the main reason to use Azure Key Vault for storing secrets instead of storing them directly in application code?
Think about security and access control for sensitive information.
Azure Key Vault encrypts secrets and provides centralized access control, which helps protect sensitive data better than embedding secrets in code.
You want an Azure Virtual Machine to access a secret from Azure Key Vault without storing credentials in code. Which configuration allows this?
Think about how Azure services can authenticate securely without passwords.
Managed Identity lets the VM authenticate to Key Vault securely without credentials, by granting it specific permissions.
You need to design a system where application secrets rotate automatically every 30 days without downtime. Which architecture best supports this?
Consider how to update secrets without stopping the application.
Azure Key Vault supports secret versioning. Applications can retrieve the latest secret version dynamically, enabling smooth rotation.
Which of the following configurations best prevents unauthorized users from accessing secrets in Azure Key Vault?
Think about limiting who and where can access the Key Vault.
Restricting network access and using role-based access control limits exposure and enforces least privilege.
What happens to a secret in Azure Key Vault immediately after it is deleted, assuming soft-delete is enabled?
Consider Azure Key Vault's soft-delete feature behavior.
With soft-delete enabled, deleted secrets remain recoverable for a configurable retention period before permanent deletion.