Encryption is a proven means of securing data in the cloud. Secure management of the keys used is essential to effectively protecting data in the cloud. With Key Vault, keys and secret keys such as passwords can be encrypted using keys that are stored in HSMs (hardware security modules). Additional security is ensured if user keys are imported or generated in HSMs that are certified for FIPS 140-2 Level 2 and Common Criteria EAL4+.

This way, the keys do not leave the HSM system. With Key Vault, keys are invisible to Microsoft and cannot be extracted.

Getting Started

Getting Started

  1. 10/1/2015, Video, 0:17:36
    Today Amit Bapat introduces Scott to Azure Key Vault. With Azure Key Vault, you can encrypt keys and small secrets like passwords using keys stored in hardware security...
  2. 8/25/2015, Video, 1:16:24
    Managing cryptographic keys and secrets is an essential part of safeguarding data in the cloud. With the new Azure Key Vault service, customers can easily import/create,...
  3. 5/31/2017, Trainings
    Security is a top-level concern when it comes to cloud computing for organizations of all types. In this course, you will be introduced to Azure security and compliance. We...
  4. 9/28/2015, Video, 0:36:39
    In this session, learn how to use disk encryption management for IaaS virtual machines and Azure Key Vault to help protect and safeguard your data to meet your organizational...
  5. 10/11/2016, Video, 0:12:25
    For a Guide to a Modern IT Environment, click: We talk about on TechDefense the importance of encryption for businesses and look at one possible...
  6. 9/28/2016, Video, 1:25:09
    Microsoft Azure enables you to control your data in Azure through advanced technologies to encrypt, control & audit access, separate, and dispose of data according to your...


Learning Paths

Manage security operations in Azure
Published: 7/1/2020, Length: 6:51:00
Learn how to configure security policies and manage security alerts with the tools and services in Azure.
Migrate an ASP.NET web application to Azure with Visual Studio
Published: 6/30/2020, Length: 1:17:00
Migrate an ASP.NET web application to Azure with Visual Studio
Architect secure infrastructure in Azure
Published: 10/23/2019, Length: 6:37:00
Learn about the tools and services available on Azure to ensure your resources are secure.

Learning Modules

Manage secrets in your server apps with Azure Key Vault
Published: 9/24/2018, Length: 0:46:00
Introduction to securing data at rest on Azure
Published: 10/29/2019, Length: 0:30:00

Azure Key Vault News

11/30/2020, MS Tech Community
Most organizations are now aware of how valuable the forms (pdf, images, videos…) they keep in their closets are. They are looking for best practices and most cost-effective ways and tools to...
11/23/2020, MS Tech Community
With the most recent updates to the SharePoint client object model (CSOM) libraries it is now possible to authenticate to SharePoint and Project Online with the MSAL libraries rather than ADAL -...
11/18/2020, MS Tech Community
MSTICPy, our CyberSec toolset for Jupyter notebooks, has supported VirusTotal lookups since the very earliest days (the earliest days being only around two years ago!). We recently had a...
11/16/2020, MS Tech Community
Love them or hate them, certificates are a an integral part of running applications. Whether you're securing a website with HTTPS or authenticating to another server, you'll always need a way to...
11/12/2020, MS Tech Community
As a Cloud Workload Protection Platform (CWPP), Azure Defender provides protection against cyber threats aimed at servers, no matter whether they are running in Azure, on-premises, or in another...
10/23/2020, MS Tech Community
If you need to restore a database that was encrypted with a TDE (transparent data encryption) customer-managed key into a server that is encrypted with a different key, you can follow the steps...
10/22/2020, MS Tech Community
Many organizations have long standing security mandates to rotate application secrets. These secrets can range from specific identify passwords to service access keys. As more enterprises move...
10/21/2020, Service Updates
Get a deeper view into your organization's security posture, configure daily automated audits, and start enforcing best practices in under 5 minutes.
10/20/2020, MS Tech Community
Hi there, welcome to another feature release blog of the Azure CLI. Today we will be sharing with you some of the recent Azure CLI work done related to announcements atenabled several end-to-end...
10/19/2020, Service Updates
Azure Key Vault is now an events publisher with Azure Event Grid, enabling developers to subscribe to events about keys, certificates, and secrets changes.
9/22/2020, Service Updates
A new key management offering is now available in public preview: Azure Key Vault Managed HSM (hardware security model). Azure Key Vault Managed HSM offers a fully managed, highly available,...
9/22/2020, Service Updates
Azure Monitor for Key Vault and Azure Monitor for Azure Cache for Redis provide out of the box insights for these resources using platform telemetry.
8/12/2020, Service Updates
Use self-managed RSA keys stored in the Azure Key Vault to encrypt your backups and maintain full control of your data.
8/12/2020, Azure Podcast
We had a chance to talk with Ines Khelifi, the Principal PM Manager for Azure Digital Twins on the different use cases she has seen, the latest preview, and how Azure Digital Twins can be...
7/10/2020, Azure Podcast
The team is joined by Stephen Wu from ADLS to talk about how the ADLS Gen 2 team is working to simplify the Storage conversation for Azure customers by driving for feature parity with Blob...
7/3/2020, Azure DevOps Blog
Happy Friday! Working with secrets, managing the flow of work, testing, and CI are the focus points for today’s roundup. Enjoy! Using Azure Key Vault Secrets with PowerShell Tasks in Azure...
6/24/2020, Service Updates
Azure Monitor for Key Vault Preview provides comprehensive monitoring of your key vaults by delivering a unified view of your Key Vault requests, performance, failures, and latency.