Skip to content

Commit 79d19d0

Browse files
Merge pull request #2284 from Blackmist/cmk-note
note per PM team
2 parents f380f8f + 254bcf8 commit 79d19d0

File tree

2 files changed

+6
-2
lines changed

2 files changed

+6
-2
lines changed

articles/ai-studio/concepts/encryption-keys-portal.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@ The following data is stored on the managed resources.
5050
A new architecture for customer-managed key encryption with hubs is available in preview, which resolves the dependency on the managed resource group. In this new model, encrypted data is stored service-side on Microsoft-managed resources instead of in managed resources in your subscription. Metadata is stored in multitenant resources using document-level CMK encryption. An Azure AI Search instance is hosted on the Microsoft-side per customer, and for each hub. Due to its dedicated resource model, its Azure cost is charged in your subscription via the hub resource.
5151

5252
> [!NOTE]
53-
> During this preview key rotation and user-assigned identity capabilities are not supported. Service-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
53+
> - During this preview key rotation and user-assigned identity capabilities are not supported. Service-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
54+
> - If you are using the preview server-side storage, Azure charges will continue to accrue during the soft delete retention period.
5455
5556
## Use customer-managed keys with Azure Key Vault
5657

@@ -97,6 +98,7 @@ Alternatively, use infrastructure-as-code options for automation. Example Bicep
9798
* At the time of creation, you can't provide or modify resources that are created in the Microsoft-managed Azure resource group in your subscription.
9899
* You can't delete Microsoft-managed resources used for customer-managed keys without also deleting your hub.
99100
* [Azure AI services Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is still required for Speech and Content Moderator.
101+
* If you are using the [server-side preview](#preview-service-side-storage-of-encrypted-data-when-using-customer-managed-keys), Azure charges will continue to accrue during the soft delete retention period.
100102

101103
## Related content
102104

articles/machine-learning/concept-customer-managed-keys.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ For example, the managed identity for Azure Cosmos DB would need to have those p
3636

3737
* After workspace creation, the customer-managed encryption key for resources that the workspace depends on can only be updated to another key in the original Azure Key Vault resource.
3838
* Unless you are using the [server-side preview](#preview-service-side-encryption-of-metadata), the encrypted data is stored on resources in a Microsoft-managed resource group in your subscription. You can't create these resources up front or transfer ownership of them to you. The data lifecycle is managed indirectly via the Azure Machine Learning APIs as you create objects in the Azure Machine Learning service.
39+
* If you are using the [server-side preview](#preview-service-side-encryption-of-metadata), Azure charges will continue to accrue during the soft delete retention period.
3940
* You can't delete Microsoft-managed resources that you use for customer-managed keys without also deleting your workspace.
4041
* You can't encrypt the compute cluster's OS disk by using your customer-managed keys. You must use Microsoft-managed keys.
4142

@@ -123,7 +124,8 @@ To opt in for this preview, set the `enableServiceSideCMKEncryption` on a REST A
123124
:::image type="content" source="./media/concept-customer-managed-keys/cmk-service-side-encryption.png" alt-text="Screenshot of the encryption tab with the option for server side encryption selected." lightbox="./media/concept-customer-managed-keys/cmk-service-side-encryption.png":::
124125

125126
> [!NOTE]
126-
> During this preview key rotation and data labeling capabilities are not supported. Server-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
127+
> - During this preview key rotation and data labeling capabilities are not supported. Server-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
128+
> - If you are using the preview server-side storage, Azure charges will continue to accrue during the soft delete retention period.
127129
128130
For templates that create a workspace with service-side encryption of metadata, see
129131

0 commit comments

Comments
 (0)