The blog post details the process of rotating secrets stored in Azure Key Vault with each application deployment, utilizing Infrastructure as Code (IaC) principles via Terraform. It emphasizes the importance of secret rotation to minimize risks from leaks. An ASP.NET Core Web API is demonstrated as the application example, alongside procedural GitHub Actions for deployment.
[NoBrainer] Define Azure Key Vault with embedded Access Policy in Terraform
azurerm (Azure resource manager) provider for terraform allows definition of Key Vault access policies either within the azurerm_key_vault resource via the access_policy block or by using the azurerm_key_vault_access_policy resource (using both methods for access policy management leads to conflicts). The advantage of defining Key Vault access policies within the azurerm_key_vault resource over defining azurerm_key_vault_access_policy resource(s)... Continue Reading →
