Advertisement

Azure Key Vault Usage Patterns

  • Stephen Haunts
Chapter

Abstract

In the preceding chapters, we built a sophisticated encryption example with the ability to encrypt data with the efficiency of AES, and uses RSA to make it easier to swap encryption keys with other users. We then looked at how to leverage and set up Azure Key Vault, which offers a cost-effective way to use a hardware security module that traditionally is out of reach to most companies, except large organizations like banks.

Copyright information

© Stephen Haunts 2019

Authors and Affiliations

  • Stephen Haunts
    • 1
  1. 1.BelperUK

Personalised recommendations