Security & Identity¶
Design patterns for Azure security controls — least-privilege access, secret management, and privileged identity governance to reduce attack surface and audit exposure.
-
Patterns for using Just-In-Time VM access via Microsoft Defender for Cloud to lock down inbound VM ports and grant access on demand.
-
Patterns for centralising secret, certificate, and key management using Azure Key Vault across services and pipelines.
-
Azure Privileged Identity Management
Patterns for implementing time-bound and approval-based privileged role activation using Azure PIM.