Skip to content

Security & Identity

Design patterns for Azure security controls — least-privilege access, secret management, and privileged identity governance to reduce attack surface and audit exposure.


  • Azure JIT VM Access

    Patterns for using Just-In-Time VM access via Microsoft Defender for Cloud to lock down inbound VM ports and grant access on demand.

  • Azure Key Vault

    Patterns for centralising secret, certificate, and key management using Azure Key Vault across services and pipelines.

  • Azure Privileged Identity Management

    Patterns for implementing time-bound and approval-based privileged role activation using Azure PIM.