1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Managing Application Configuration and Secrets in Azure

Managing Application Configuration and Secrets in Azure

play-arrow
Course Introduction
Overview
DifficultyIntermediate
Duration1h 14m
Students146
Ratings
4/5
starstarstarstarstar-border

Description

Configuration is an important aspect of determining an application’s behavior. Settings files often include sensitive information like passwords and API keys. In this course, we will look at how to protect that sensitive information while the app is being developed and when it is in production.

Azure’s App Configuration Service allows you to manage access to settings data and we will see how to use it within a .Net application. We will look at using Azure Key Vault in conjunction with App Configuration Service, and how to access Azure Key Vault directly from your application and from apps running in a container within a Kubernetes cluster.

Next, we look at the idea of shifting left security testing within your development process, and how we can automate security testing as part of implementing a compliant development process. Much of this will involve using extensions from the Azure marketplace within your DevOps build pipeline.

This course contains numerous demonstrations from the Azure platform so that you can get a first-hand look at the topics we will be covering. If you have any feedback relating to this course, please contact us at support@cloudacademy.com.

Learning Objectives

  • Learn about app configuration
  • Run and deploy apps with the Azure App Configuration service
  • Use Azure Key Vault to store secrets and certificates
  • Access Key Vault directly from your apps, including those running within a Kubernetes cluster
  • Create a compliant development process by integrating code analyzers, branch policies, quality gates, open-source library scanning, and automated penetration into a build pipeline

Intended Audience

  • Intermediate-level developers, DevOps engineers, and product managers
  • Anyone interested in learning how to implement secure app configurations and development pipelines

Prerequisites

To get the most out of this course, you should have some pre-existing knowledge of software development and of using Microsoft Azure.

Transcript

Hi, and welcome to this Managing Application Configuration and Secrets in Azure course. This is very much a hands-on course with lots of demonstrations that require some preexisting knowledge of software development and use of the Azure platform, so directed mainly at intermediate level developers and DevOps engineers. Having said that, project managers may find it insightful as to what is involved in implementing secure configuration and a compliant development pipeline.

Firstly, we'll take a practical look at app configuration and the Azure App Configuration service in terms of running and deploying apps, followed by using Azure Key Vault in different contexts. Secondly, I'll delve into the elements needed to build what's termed a compliant pipeline. Basically, this is automating security and vulnerability testing within your development pipeline. While this is an Azure DevOps course and the demos will be using Visual Studio, I'll also be talking about Azure Kubernetes Service and OWASP, the Open Web Application Security Project, so it will be helpful if you have some basic understanding of what these are.

My name is Hallam Webber and I'll be your instructor for this course. We welcome all comments and feedback, so please feel free to reach out to us at support@cloudacademy.com with any questions or comments. Let's get started.

About the Author

Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a  Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.