Skip to content

Commit 17d3ca6

Browse files
committed
cmk updates
1 parent 009f2fc commit 17d3ca6

File tree

4 files changed

+50
-86
lines changed

4 files changed

+50
-86
lines changed

articles/ai-foundry/concepts/encryption-keys-portal.md

Lines changed: 45 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,22 @@ Customer-managed keys (CMKs) in [Azure AI Foundry portal](https://ai.azure.com/?
2222

2323
## About encryption in Azure AI Foundry
2424

25-
Azure AI Foundry is a service in the Microsoft Azure cloud. By default, services use Microsoft-managed encryption keys to encrypt data in transit and at rest.
25+
Azure AI Foundry is a service in the Microsoft Azure cloud. By default, services use Microsoft-managed encryption keys to encrypt data in transit and at rest.
2626

2727
::: zone pivot="hub-project"
2828

29-
Hub and [!INCLUDE [hub](../includes/hub-project-name.md)] resources are implementations of the Azure Machine Learning workspace and encrypt data in transit and at rest. For details, see [Data encryption with Azure Machine Learning](../../machine-learning/concept-data-encryption.md).
29+
Azure AI Hub resource takes a dependency on Azure AI Foundry resource as a dependency. Both resources are managed in your Azure subscription. You must configure customer-managed key encryption on both.
30+
31+
* AI Foundry resources, data is encrypted and decrypted using [FIPS 140-2](https://en.wikipedia.org/wiki/FIPS_140-2) compliant [256-bit AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) encryption. Encryption and decryption are transparent, meaning encryption and access are managed for you. Your data is secure by default and you don't need to modify your code or applications to take advantage of encryption.
32+
33+
* AI Hub resources, and [!INCLUDE [hub](../includes/hub-project-name.md)] resources are implementations of the Azure Machine Learning workspace and encrypt data in transit and at rest. For details, see [Data encryption with Azure Machine Learning](../../machine-learning/concept-data-encryption.md).
3034

3135
::: zone-end
3236

3337
::: zone pivot="fdp-project"
3438

39+
When an Azure AI Foundry resource is created, you can update from Microsoft-managed keys to customer-managed keys. However, you cannot switch back from customer-managed keys to Microsoft-managed keys.
40+
3541
Data is encrypted and decrypted using [FIPS 140-2](https://en.wikipedia.org/wiki/FIPS_140-2) compliant [256-bit AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) encryption. Encryption and decryption are transparent, meaning encryption and access are managed for you. Your data is secure by default and you don't need to modify your code or applications to take advantage of encryption.
3642

3743
::: zone-end
@@ -130,7 +136,7 @@ Customer-managed key encryption is configured via Azure portal in a similar way
130136
## Limitations
131137

132138
* The customer-managed key for encryption can only be updated to keys in the same Azure Key Vault instance.
133-
* After deployment, your [!INCLUDE [fdp](../includes/fdp-project-name.md)] can't switch from Microsoft-managed keys to customer-managed keys or vice versa.
139+
* After deployment, your [!INCLUDE [fdp](../includes/fdp-project-name.md)] can't switch from customer-managed keys to Microsoft managed keys.
134140
* Azure charges for the AI Foundry resource will continue to accrue during the soft delete retention period. Charges for projects don't continue to accrue during the soft delete retention period.
135141

136142
::: zone-end
@@ -149,16 +155,46 @@ Alternatively, use infrastructure-as-code options for automation. Example Bicep
149155
1. [CMK encryption for hub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.machinelearningservices/aifoundry-cmk).
150156
1. [Service-side CMK encryption preview for hub](https://github.com/azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.machinelearningservices/aistudio-cmk-service-side-encryption).
151157

158+
::: zone-end
159+
160+
## Encryption Key Rotation
161+
162+
If you're using [customer-managed key encryption](../concepts/encryption-keys-portal.md), Azure AI Foundry allows you to rotate the encryption key used to protect your data. This applies to data stored in Microsoft-managed infrastructure, encrypted using your Azure Key Vault key.
163+
164+
Rotation Limitations
165+
166+
* **Same Key Vault Requirement**
167+
168+
You can only rotate encryption keys to another key within the same Azure Key Vault instance. Cross-vault key rotation is not supported.
169+
170+
* **Scope of Rotation**
171+
172+
The new key must be compatible with the existing encryption configuration. Ensure that the new key is properly configured with the necessary access policies and permissions.
173+
174+
* **Updating from customer-managed to Microsoft-managed**
175+
176+
When an Azure AI Foundry resource or/and AI Hub is created, you can update from Microsoft-managed keys to customer-managed keys. However, you cannot switch back from customer-managed keys to Microsoft-managed keys.
177+
178+
How to Rotate Encryption Keys
179+
180+
* In your Azure Key Vault, create or identify the new key you want to use for encryption.
181+
182+
* From Azure Portal or template options, update the resource configuration to reference the new key within the same Key Vault.
183+
184+
* Your resource will take a few minutes to wrap data using your new encryption key. During this period, certain service operations are available.
185+
186+
* The service will begin using the new key for encryption of newly stored data. Existing data remains encrypted with the previous key unless reprocessed.
187+
152188
## Limitations
153189

154190
* The customer-managed key for encryption can only be updated to keys in the same Azure Key Vault instance.
155-
* After deployment, hubs can't switch from Microsoft-managed keys to Customer-managed keys or vice versa.
191+
* After deployment, you can't switch from Customer-managed keys to Microsoft managed keys.
156192
* [Azure AI Foundry Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is required to use customer-managed keys in combination with Azure Speech and Content Moderator capabilities.
157-
* [Azure AI Foundry Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is still required for Speech and Content Moderator.
158-
* If your AI Foundry resource is in a soft-deleted state(#preview-service-side-storage-of-encrypted-data-when-using-customer-managed-keys), any additional Azure charges will continue to accrue during the soft delete retention period.
159-
160-
::: zone-end
193+
* [Azure AI Foundry Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is required for Speech and Content Moderator.
194+
* If your AI Foundry resource is in a soft-deleted state, any additional Azure charges will continue to accrue during the soft delete retention period.
161195

162-
## Related content
196+
## Learn more
163197

198+
* [Customer-managed key encryption](../concepts/encryption-keys-portal.md)
199+
* [Disable local auth](disable-local-auth.md)
164200
* [What is Azure Key Vault](/azure/key-vault/general/overview)?

articles/ai-foundry/how-to/rotate-keys.md

Lines changed: 0 additions & 71 deletions
This file was deleted.

articles/ai-foundry/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -859,6 +859,8 @@ items:
859859
href: concepts/rbac-azure-ai-foundry.md
860860
- name: Configure key-less authentication
861861
href: foundry-models/how-to/configure-entra-id.md
862+
- name: Rotate API access keys
863+
href: ../ai-services/rotate-keys.md?context=/azure/ai-foundry/context/context
862864
- name: Network security
863865
items:
864866
- name: Configure private link
@@ -878,8 +880,6 @@ items:
878880
items:
879881
- name: Configure customer-managed keys
880882
href: concepts/encryption-keys-portal.md
881-
- name: Rotate keys
882-
href: how-to/rotate-keys.md
883883
- name: Disable shared key access to storage
884884
href: how-to/disable-local-auth.md
885885
- name: Azure policies

articles/ai-services/rotate-keys.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.date: 5/19/2025
1212
ms.author: pafarley
1313
---
1414

15-
# Rotate keys in Azure AI services
15+
# Rotate API keys
1616

17-
Each Azure AI Foundry resource has two API keys to enable secret rotation. This is a security precaution that lets you regularly change the keys that can be used to access your service, protecting the privacy of your resource if a key gets leaked.
17+
Each resource has two API keys to enable secret rotation. This is a security precaution that lets you regularly change the keys that can be used to access your service, protecting the privacy of your resource if a key gets leaked.
1818

1919
## How to rotate keys
2020

@@ -32,5 +32,4 @@ You can rotate keys using the following procedure:
3232

3333
## See also
3434

35-
* [What are Azure AI services?](./what-are-ai-services.md)
36-
* [Azure AI services security features](./security-features.md)
35+
* [Configure key-less authentication](foundry-models/how-to/configure-entra-id.md)

0 commit comments

Comments
 (0)