- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
To enhance security, it is essential to ensure that all keys in non-role-based access control (RBAC) Azure Key Vaults have an expiration date set. Azure Key Vault allows users to securely store and utilize cryptographic keys in the Azure environment. By default, keys in the key vault never expire.
However, it is recommended to regularly rotate the keys and set explicit expiration dates for each key. This practice ensures that keys cannot be used beyond their designated lifetimes, reducing the risk of unauthorized use.
The impact of setting expiration dates for keys is that they will no longer be usable once their assigned expiration times are reached. It is important to periodically rotate the keys wherever they are utilized to maintain a high level of security.