Previously, we discussed how to include security in what we build. In Part 2 of 4, we will take a look at how to use these resources to their best effect in order to apply access control and enforce control and governance requirements in cloud resources by using Azure Active Directory (AD) to verify the identity of a Vault user.
Next up: Part 3: Meeting Image Compliance on Your Azure Fleet with Packer
Return to main page for Azure Security Webinar Series