Azure KeyVault client should support SecureStrings
See original GitHub issueAlthough it is unlikely an app inside of Azure would be compromised at the process memory level, it still would be nice if the Key Vault client supported returning a SecureString
for the value of the secret.
var secret = await _keyVaultClient.GetSecretSecureAsync(secretId);
var value = secret.SecureValue;
Issue Analytics
- State:
- Created 8 years ago
- Comments:5 (2 by maintainers)
Top Results From Across the Web
Best practices for using Azure Key Vault
Encryption keys and secrets like certificates, connection strings, and passwords are sensitive and business critical. You need to secure access ...
Read more >Azure Key Vault security overview
Azure Key Vault protects cryptographic keys, certificates (and the private keys associated with the certificates), and secrets (such as ...
Read more >How to get a SecureString out of an Azure KeyVault - C# - ...
2 Answers. For anyone else checking this, it is not possible to directly get a SecureString out of an Azure KeyVault. So not...
Read more >What is Azure Key Vault?
Azure Key Vault is a cloud service for securely storing and accessing secrets. A secret is anything that you want to tightly control...
Read more >Securing Secrets Using Azure Key Vault and Config ...
When the Key Vault client supports returning SecureStrings , you could use that to protect secrets in memory; Rotate encryption keys every so ......
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Dear colleague, layered security principle is that security risk mitigations complement each other, rather than the argument that o-well-other-layers-didn’t-plug-the-hole-so-why-would-we? If the assemblies you are using don’t have native support for SecureString serialization, that’s exactly where you Key Vault as a service for secrets need to pass them only an encrypted payload which when you do decrypt is kept immediately in a SecureString (CryptoStream byte by byte to SecureString followed by dispose to purge the buffers from memory).
Also, what’s even more interesting is that the DocumentClient (for cosmosdb) constructor accepts the masterKey as a SecureString. Is there a different way of getting the cosmos masterKey as a SecureString that I’m missing? (from Azure Key Vault, I mean). Not locally via Service Fabric.