Secrets management best practices
Your application needs to connect to an Azure SQL database and requires the connection string with username and password. The development team is debating how to provide these credentials to the application running in AKS. Which approach follows security best practices for managing sensitive credentials in AKS?
This exercise is part of the course
Azure Compute Solutions
Hands-on interactive exercise
Turn theory into action with one of our interactive exercises
Start Exercise