For Security and Cost Control

  • Delete the verification VM once you have confirmed that the private endpoint is functioning correctly. Leaving it running may expose it to unnecessary risk and incur additional charges.

  • Securely remove any downloaded credentials, including the database wallet and schema password files, after verification is complete.

  • Do not share the private key, wallet files, or access tokens with unauthorized users. Store them in a secure location and limit access to only those who require it.

  • Rotate OAuth2 client secrets if they were exposed during testing, following your organization’s security policies.

These practices help prevent unauthorized access and reduce exposure of sensitive data.