Search for Microsoft security blog posts written and shared by the community.
Bicep: Dynamic naming technique
by Robbe Van den Daele
security
Introduction When designing IaC modules finding the correct syntax to deploy a certain resource type is often not the hardest thing to do. What I found in 4 years of writing Bicep code, is that def...