Previously, we discussed how to include security in what we build. In Part 2 of 4, we will take a look at how to use these resources to their best effect in order to apply access control and enforce control and governance requirements in cloud resources by using Azure Active Directory (AD) to verify the identity of a Vault user.
Next up: Part 3: Meeting Image Compliance on Your Azure Fleet with Packer
Return to main page for Azure Security Webinar Series
This webinar has concluded. Once the recording has been posted, you’ll be able to see it here. Recordings are usually available 2 - 3 days after the date of the live webinar.
This webinar has concluded. Once the recording has been posted, you’ll be able to see it here. Recordings are usually available 2 - 3 days after the date of the live webinar.