<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Pedro Ignácio</title>
    <description>The latest articles on DEV Community by Pedro Ignácio (@pedroignacio13).</description>
    <link>https://dev.to/pedroignacio13</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F373587%2Fdf8187a6-7360-49cd-a063-6f14ee30556a.jpeg</url>
      <title>DEV Community: Pedro Ignácio</title>
      <link>https://dev.to/pedroignacio13</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/pedroignacio13"/>
    <language>en</language>
    <item>
      <title>Azure Key Vault</title>
      <dc:creator>Pedro Ignácio</dc:creator>
      <pubDate>Wed, 28 Feb 2024 01:05:36 +0000</pubDate>
      <link>https://dev.to/pedroignacio13/azure-key-vault-4i7b</link>
      <guid>https://dev.to/pedroignacio13/azure-key-vault-4i7b</guid>
      <description>&lt;p&gt;When building our cloud solutions, we constantly face security-related questions. "Where should I store my database credentials?" "How can I implement my certificate to establish secure communication?" "How should I store the key used to encrypt my files in a blob storage?" These are some questions that arise. To answer these questions, the response is the same: by using &lt;strong&gt;Azure Key Vault&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is it used for?
&lt;/h2&gt;

&lt;p&gt;In the introduction, I mentioned some functions for which Azure Key Vault can be used, but in this section, we'll describe them in more detail.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuz4j7b90r1vsmijxme6c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuz4j7b90r1vsmijxme6c.png" alt="Azure Key Vault capabilities" width="582" height="662"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Vaults (not restricted only to Azure Key Vault, but also solutions like Hashicorp Vault) are used to securely store and access sensitive credentials and protect access to them.&lt;/p&gt;

&lt;p&gt;Azure Key Vault is mainly used with 3 types of resources: &lt;strong&gt;keys&lt;/strong&gt;, &lt;strong&gt;secrets&lt;/strong&gt;, and &lt;strong&gt;certificates&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keys&lt;/strong&gt; - are used to encrypt data in other services (e.g., storage accounts, Cosmos DB, SQL Database, etc.);&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Secrets&lt;/strong&gt; - can be various things such as passwords, API Keys, and other information that should have protected public access;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Certificates&lt;/strong&gt; - used to establish secure communications and authentications; we can manage the lifecycle of objects within the vault.&lt;/p&gt;

&lt;p&gt;The objects mentioned above and managed by the Key Vault can have their lifecycle controlled by the resource (within existing limitations). Certificates can be created and deleted, keys can be created, rotated, and deleted, secrets can be updated, and so forth.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We understand the basic resources of Azure Key Vault, but now, what is it used for?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fysic18bvynhi9tjay1jx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fysic18bvynhi9tjay1jx.png" alt="Application using Azure Key Vault" width="592" height="345"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The diagram above shows the most common use case scenario for Azure Key Vault. We see an application consuming not only a &lt;strong&gt;secret&lt;/strong&gt; stored in the vault (used to access a database) but also consuming a &lt;strong&gt;certificate&lt;/strong&gt; (used for TLS communication establishment).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsfhf365l7ip9r7xzv46h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsfhf365l7ip9r7xzv46h.png" alt="Storage Account using Azure Key Vault" width="411" height="208"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the second scenario shown above, we see an Azure Storage Account consuming a &lt;strong&gt;key&lt;/strong&gt; stored in Azure Key Vault to encrypt the existing blobs within it.&lt;/p&gt;

&lt;p&gt;These are two of the most common usage scenarios for the vault, but they are not limited to these. You can use a vault as you see fit, as long as the proposed solution meets your demand.&lt;/p&gt;




&lt;h2&gt;
  
  
  Architecture
&lt;/h2&gt;

&lt;p&gt;Being a PaaS (Platform as a Service), we have nothing to manage regarding Key Vault infrastructure, but its functions are segregated so that we have a management panel and a panel for accessing the data contained in the vault.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffvrdepslwvd3vplm0zjy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffvrdepslwvd3vplm0zjy.png" alt="Azure Key Vault's management and data planes" width="770" height="624"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This division between the &lt;strong&gt;management plane&lt;/strong&gt; and the &lt;strong&gt;data plane&lt;/strong&gt; is not visible to end users (developers, architects, engineers, etc.), but it is highly influential when we think about access control (the subject of the next section).&lt;/p&gt;

&lt;p&gt;The architecture designed for Azure Key Vault allows us to have greater control and security over our data and who accesses it.&lt;/p&gt;




&lt;h2&gt;
  
  
  Access Control
&lt;/h2&gt;

&lt;p&gt;Still on the theme that concluded the last section, the access control model for Azure Key Vault is slightly different from what we are used to finding in other resources.&lt;/p&gt;

&lt;p&gt;As designed, it is possible to separate the use of vault managers and consumers, thus establishing more effective granular control of the responsibilities of each of the actors.&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;management plane&lt;/strong&gt; is responsible for managing all aspects of the vault's operation, such as its properties, access permissions, secret configurations, keys, and certificates. The &lt;strong&gt;data plane&lt;/strong&gt; enables access to valuable information in the resource, such as the values of secrets, keys, and certificates stored.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjlg40mha4cfixfcdub34.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjlg40mha4cfixfcdub34.png" alt="Azure Key Vault's planes capabilities" width="542" height="674"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As we can see in the simple diagram above, the granularity of permissions existing in the &lt;strong&gt;data plane&lt;/strong&gt; allows greater control over what an identity can do on a particular type of object. This granularity does not exist in the RBAC of the &lt;strong&gt;management plane&lt;/strong&gt;, as it implements much of the existing roles in other Azure resources (e.g., contributor, reader, admin, etc.).&lt;/p&gt;

&lt;p&gt;This model allows applications to receive only the necessary accesses to perform operations on the object in question. It is not necessary to provide the application with visibility into other things in the vault, much less the vault itself. Access is made directly to the necessary resource, without passing through any other "barrier."&lt;/p&gt;




&lt;p&gt;Vault solutions are extremely useful when we are building our cloud solutions. Solutions like Hashicorp Vault, AWS KMS, and Azure Key Vault offer ways to keep access to information secure, following best practices in cloud solution architecture.&lt;/p&gt;

&lt;p&gt;I hope you enjoyed the text and that in some way I have been able to help you understand the functionalities of the vault as well as the ways in which it can be used in your solutions.&lt;/p&gt;

&lt;p&gt;See you soon!&lt;/p&gt;

</description>
      <category>azure</category>
      <category>cybersecurity</category>
      <category>cloud</category>
      <category>architecture</category>
    </item>
    <item>
      <title>First Post</title>
      <dc:creator>Pedro Ignácio</dc:creator>
      <pubDate>Wed, 26 Jan 2022 13:00:26 +0000</pubDate>
      <link>https://dev.to/pedroignacio13/cloud-architecture-patterns-book-4dp0</link>
      <guid>https://dev.to/pedroignacio13/cloud-architecture-patterns-book-4dp0</guid>
      <description>&lt;p&gt;Hello everybody, my name is Pedro, I'm a 20 years old Brazilian IT Architect on my way to becoming a cloud engineer.&lt;/p&gt;

&lt;p&gt;Overall I will post cloud and system's architecture related things and I'll try to make it very simple for everyone to understand.&lt;/p&gt;

&lt;p&gt;I would appreciate any pieces of advice from more experienced people (and from those who aren't at all) and I'll always be open to talk about cloud and other stuff.&lt;/p&gt;

&lt;p&gt;You can connect with me on LinkedIn on this link: &lt;a href="https://www.linkedin.com/in/pedro-ign%C3%A1cio-a97831182"&gt;https://www.linkedin.com/in/pedro-ign%C3%A1cio-a97831182&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I'll be writing here in the next couple of days. I'm preparing to take the AZ-104 exam on February's 19th and I would really like to share with you my experiences.&lt;/p&gt;

&lt;p&gt;I just started reading the Cloud Architecture Patterns (O'Reilly's book) and I'll be sharing chapter by chapter the thing I've learned.&lt;/p&gt;

&lt;p&gt;Stay safe everyone. I'll see you soon!&lt;/p&gt;

</description>
      <category>azure</category>
      <category>cloud</category>
      <category>architecture</category>
      <category>books</category>
    </item>
  </channel>
</rss>
