Secure your Azure Container Apps Environment (Part 02)

Series recap — Part 01: In Part 01 we covered the security baseline for Azure Container Apps Environments: network isolation using a custom VNet with dedicated subnets, locking down egress with Azure Firewall and UDR, disabling public network access, and enabling internal-only ingress. We also walked through the zero-trust identity model using Managed Identity and Azure Container Registry access.
In the 2nd part of this 2 part series on securing Azure Container Apps Environment, we will look into a deployment example. We will make use of Azure Verified Modules as far as possible. Then we will cover some scenarios on how you can make this available to your development teams and how development teams can perform deployments of Azure Container Apps into the managed environment safely.

