Enable purge protection on key-vault-create vault#14759
Conversation
|
@alex-frankel — first, thanks for your patience and for the clear feedback on the previous round of PRs (#14739, #14740, #14741, #14742). Your write-up of the new This PR follows the contribution-guide workflow:
Ready for review / |
Adds enablePurgeProtection: true to the vault in key-vault-create/main.bicep (and the regenerated azuredeploy.json). Without purge protection, soft-deleted vault contents can be permanently destroyed during the soft-delete retention window. Enabling purge protection guarantees the configured retention window is honored, which is the recommended Key Vault security baseline. Validation: - correlationId: 08a19c7d-365d-455d-bbac-4de41d42a718 - deploymentName: kvc-deploy-2b2b8b3f - region: eastus - provisioningState: Succeeded metadata.json updated with validationType: Manual and the testResult.deployments block. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
3be8de1 to
94ea243
Compare
|
@mumian - check this PR for updates that may be needed to documentation that references this sample. [This is an automated message. You are receiving it because you are listed as the docOwner in metadata.json.] |
|
/validate |
🤖 Quickstart Sample SummarySample Summary
Resources Deployed
Security Findings
Key Parameters
Notes for Reviewers
Files Touched
Generated by the quickstart summarizer agent (v2 — agentic + MSDO security) · triggered by /validate |
Brings the portal quickstart in line with the CLI/PowerShell quickstart includes (MicrosoftDocs/reusable-content#624) and the ARM/Bicep templates (Azure/azure-quickstart-templates#14759-#14762), all of which now enable purge protection by default. Adds an explicit step to flip the toggle on the Recovery options tab and revises the existing NOTE to explain why. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Summary
Adds
enablePurgeProtection: trueto the vault inkey-vault-create/main.bicep(and the regeneratedazuredeploy.json).Why
Without purge protection, soft-deleted secrets, keys, and certificates can be permanently destroyed during the soft-delete retention window — either by an attacker with delete permissions or by an accidental
az keyvault purge. Enabling purge protection guarantees the configured retention window is honored, which is the recommended Key Vault security baseline (and a hard requirement for several Azure compliance offerings, e.g. for vaults that hold storage account or disk encryption keys). Soft delete + purge protection should both be on by default for a sample that's billed as a quickstart.The change is minimal: one line added to the
propertiesblock.softDeleteRetentionInDays: 90was already present.Validation
Per the contribution guide, deployed the updated
main.bicepto my subscription:correlationId: 08a19c7d-365d-455d-bbac-4de41d42a718deploymentName: kvc-deploy-2b2b8b3fprovisioningState: Succeededmetadata.jsonupdated withvalidationType: Manualand thetestResult.deploymentsblock.