Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.1.2. Azure Key Vault Security

💡 First Principle: Key Vault centralizes secrets, keys, and certificates. Security requires controlling who can access the vault, what they can do, and how the vault is accessed over the network.

Access Control Models

ModelDescriptionRecommendation
Vault access policyPer-vault permission assignmentLegacy, fine-grained control
Azure RBACRole assignments at vault scopeRecommended, consistent with Azure

Key Vault RBAC Roles

RoleCapabilities
Key Vault AdministratorFull management, no data access
Key Vault Secrets OfficerAll secret operations
Key Vault Secrets UserRead secrets
Key Vault Crypto OfficerAll key operations
Key Vault Crypto UserCryptographic operations
Key Vault Certificates OfficerAll certificate operations

⚠️ Exam Trap: Assigning Key Vault Secrets Officer when Crypto Officer is needed. For key management (read/write keys), use Key Vault Crypto Officer. Secrets Officer manages secrets, not keys.

Key Vault Network Security

  • Firewall: Restrict access to specific IP ranges
  • Virtual network rules: Allow access from specific subnets
  • Private endpoint: Access via private IP in your VNet

Key Rotation and Backup

  • Key rotation: Supported for keys and secrets
  • Backup/Restore: Export encrypted backup, restore to same geography
  • Soft delete: Recover deleted items (mandatory)
  • Purge protection: Prevent permanent deletion during retention period

Key Decision: For keys that cannot be permanently deleted for 60 days, enable both soft delete and purge protection on a software-protected key vault (HSM is not required and is more expensive).

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications