For Security and Cost Control
-
Delete the verification VM once you have confirmed that the private endpoint is functioning correctly. Leaving it running may expose it to unnecessary risk and incur additional charges.
-
Securely remove any downloaded credentials, including the database wallet and schema password files, after verification is complete.
-
Do not share the private key, wallet files, or access tokens with unauthorized users. Store them in a secure location and limit access to only those who require it.
-
Rotate OAuth2 client secrets if they were exposed during testing, following your organization’s security policies.
These practices help prevent unauthorized access and reduce exposure of sensitive data.