Skip to content

Commit 7a3e0ef

Browse files
committed
fix acrolynx
1 parent 8587e78 commit 7a3e0ef

File tree

1 file changed

+17
-19
lines changed

1 file changed

+17
-19
lines changed

articles/ai-foundry/concepts/encryption-keys-portal.md

Lines changed: 17 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ Azure AI Foundry is a service in the Microsoft Azure cloud. By default, Azure se
2626

2727
::: zone pivot="hub-project"
2828

29-
When you use hub-based projects, the Azure AI hub resource acts as gateway to a number of Azure services including Azure AI Hub, Azure Storage account and Azure AI Foundry resource. You must configure customer-managed key encryption on each of these services to use CMK encryption throughout with AI Foundry.
29+
When you use hub-based projects, the Azure AI hub resource acts as gateway to multiple Azure services including Azure AI Hub, Azure Storage account, and Azure AI Foundry resource. You must configure customer-managed key encryption on each of these services to use CMK encryption throughout with AI Foundry.
3030

3131
* AI Hub resources, and [!INCLUDE [hub](../includes/hub-project-name.md)] resources are implementations of the Azure Machine Learning workspace and encrypt data in transit and at rest. For details, see [Data encryption with Azure Machine Learning](../../machine-learning/concept-data-encryption.md).
3232

3333
* AI Foundry resources data is encrypted and decrypted using [FIPS 140-2](https://en.wikipedia.org/wiki/FIPS_140-2) compliant [256-bit AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) encryption. Encryption and decryption are transparent, meaning encryption and access are managed for you. Your data is secure by default and you don't need to modify your code or applications to take advantage of encryption.
3434

35-
* Azure Storage accounts are used to store data uploaded when using AI Foundry portal and when using Foundry tools. For details on how to setup CMK encryption, see [Customer-managed keys for Azure Storage encryption](/azure/storage/common/customer-managed-keys-overview).
35+
* Azure Storage accounts are used to store data uploaded when using AI Foundry portal and when using Foundry tools. For details on how to set up CMK encryption, see [Customer-managed keys for Azure Storage encryption](/azure/storage/common/customer-managed-keys-overview).
3636

3737
::: zone-end
3838

@@ -43,7 +43,7 @@ On your Azure AI Foundry resource data is encrypted and decrypted using [FIPS 14
4343
::: zone-end
4444

4545
> [!IMPORTANT]
46-
> If you [connect AI Foundry with other Azure tools](../how-to/connections-add.md), note that CMK encryption must be configured on every top level Azure resource.
46+
> If you [connect AI Foundry with other Azure tools](../how-to/connections-add.md), CMK encryption must be configured on every top level Azure resource.
4747
4848
::: zone pivot="hub-project"
4949
## Data storage options with Azure AI Hub CMK encryption
@@ -52,11 +52,11 @@ Two architecture options are available when using customer-managed keys with Azu
5252

5353
* **(Recommended) Encrypted data is stored in Microsoft subscription**
5454

55-
Data is stored service-side on Microsoft-managed resources instead of in managed resources in your subscription. Metadata is stored in multitenant resources using document-level CMK encryption. An Azure AI Search instance is hosted in the Microsoft-subscription per customer, for each hub, in order to provide data isolation of encrypted data. It is recommended to pick this option for any new deployments.
55+
Data is stored service-side on Microsoft-managed resources instead of in managed resources in your subscription. Metadata is stored in multitenant resources using document-level CMK encryption. An Azure AI Search instance is hosted in the Microsoft-subscription per customer, for each hub, in order to provide data isolation of encrypted data. It's recommended to pick this option for any new deployments.
5656

5757
* **(Legacy) Encrypted data is stored in your subscription**
5858

59-
Traditionally in Azure Machine Learning platform (which AI Hub resource is built on), data is stored in your subscription using a Microsoft-managed resource group that includes an Azure Storage account, Azure Cosmos DB resource and Azure AI Search. The configuration of these resources cannot be modified. Changes to its configurations are not supported.
59+
Traditionally in Azure Machine Learning platform (which AI Hub resource is built on), data is stored in your subscription using a Microsoft-managed resource group that includes an Azure Storage account, Azure Cosmos DB resource and Azure AI Search. The configuration of these resources can't be modified. Changes to its configurations aren't supported.
6060

6161
> [!IMPORTANT]
6262
> This option is available for backwards compatibility, and is not recommended for new workloads.
@@ -98,7 +98,7 @@ Managed identity must be enabled as a prerequisite for using customer-managed ke
9898
Customer-managed key encryption is configured via Azure portal (or alternatively infrastructure-as-code options) in a similar way for each Azure resource:
9999

100100
> [!IMPORTANT]
101-
> The Azure Key Vault used for encryption **must be in the same resource group** as the AI Foundry project. Key Vaults in other resource groups are not currently supported by the deployment wizards or project configuration workflows.
101+
> The Azure Key Vault used for encryption **must be in the same resource group** as the AI Foundry project. Key Vaults in other resource groups aren't currently supported by the deployment wizards or project configuration workflows.
102102
103103
1. Create a new Azure AI Foundry resource in the [Azure portal](https://portal.azure.com/).
104104
1. Under the **Encryption** tab, select **Customer-managed key**, **Select vault and key**, and then select the key vault and key to use.
@@ -129,25 +129,25 @@ Rotation Limitations
129129

130130
* **Same Key Vault Requirement**
131131

132-
You can only rotate encryption keys to another key within the same Azure Key Vault instance. Cross-vault key rotation is not supported.
132+
You can only rotate encryption keys to another key within the same Azure Key Vault instance. Cross-vault key rotation isn't supported.
133133

134134
* **Scope of Rotation**
135135

136136
The new key must be compatible with the existing encryption configuration. Ensure that the new key is properly configured with the necessary access policies and permissions.
137137

138138
* **Updating from customer-managed to Microsoft-managed**
139139

140-
When an Azure AI Foundry resource or/and AI Hub is created, you can update from Microsoft-managed keys to customer-managed keys. However, you cannot switch back from customer-managed keys to Microsoft-managed keys.
140+
When an Azure AI Foundry resource or/and AI Hub is created, you can update from Microsoft-managed keys to customer-managed keys. However, you can't switch back from customer-managed keys to Microsoft-managed keys.
141141

142142
How to Rotate Encryption Keys
143143

144144
* In your Azure Key Vault, create or identify the new key you want to use for new data encryption.
145145

146146
* From Azure Portal or template options, update the resource configuration to reference the new key within the same Key Vault.
147147

148-
* Your resource will take a few minutes to configure wrapping data using your new encryption key. During this period, certain service operations are available.
148+
* Your resource takes a few minutes to configure wrapping data using your new encryption key. During this period, certain service operations are available.
149149

150-
* The service will begin using the new key for encryption of newly stored data. Existing data remains encrypted with the previous key unless reprocessed.
150+
* The service begins using the new key for encryption of newly stored data. Existing data remains encrypted with the previous key unless reprocessed.
151151

152152
## Revoke a customer-managed key
153153

@@ -171,22 +171,20 @@ az keyvault key delete \
171171
```
172172

173173
> [!IMPORTANT]
174-
> Revoking access to an active customer-managed key while CMK is still enabled will prevent downloading of training data and results files, fine-tuning new models, and deploying fine-tuned models. However, previously deployed fine-tuned models will continue to operate and serve traffic until those deployments are deleted.
174+
> Revoking access to an active customer-managed key while CMK is still enabled will prevent downloading of training data and results files, fine-tuning new models, and deploying fine-tuned models. However, previously deployed fine-tuned models continue to operate and serve traffic until those deployments are deleted.
175175
176-
## Additional Azure cost when using customer-managed keys
176+
## Extra Azure cost when using customer-managed keys
177177

178-
When using customer-managed keys, generally your data is stored using document-level encryption in Microsoft-managed storage components. To ensure your data can be stored in isolation and encrypted using your keys, certain backend Azure services used by Azure AI Foundry must be hosted in a dedicated manner per AI Foundry resource in combination with CMK encryption. Additional charges apply when using CMK to accomodate this dedicated hosting model. These charges will show in Azure Cost management as sub line items under your Azure AI Foundry resource.
178+
When using customer-managed keys, generally your data is stored using document-level encryption in Microsoft-managed storage components. To ensure your data can be stored in isolation and encrypted using your keys, certain backend Azure services used by Azure AI Foundry must be hosted in a dedicated manner per AI Foundry resource in combination with CMK encryption. Additional charges apply when using CMK to accommodate this dedicated hosting model. These charges will show in Azure Cost management as sub line items under your Azure AI Foundry resource.
179179

180180
## Limitations
181181

182182
* AI Foundry resources may be updated from Microsoft-managed keys to customer-managed keys, but not from customer-managed keys to Microsoft-managed keys.
183-
* AI Foundry hub resources cannot be updated from Microsoft-managed keys to customer-managed keys, or vice versa, post-creation.
183+
* AI Foundry hub resources can't be updated from Microsoft-managed keys to customer-managed keys, or vice versa, post-creation.
184184
* The customer-managed key for encryption can only be updated to keys in the same Azure Key Vault instance.
185-
* Azure OpenAI assistants service does not support CMK encryption.
186-
* While project sub-resources exist, you can't switch AI Foundry resources from Customer-managed keys to Microsoft managed keys.
187185
* [Azure AI Foundry Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is required to use customer-managed keys in combination with Azure Speech and Content Moderator capabilities.
188186
* [Azure AI Foundry Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is required for Speech and Content Moderator.
189-
* If your AI Foundry resource is in a soft-deleted state, any additional Azure charges will continue to accrue during the soft delete retention period.
187+
* If your AI Foundry resource is in a soft-deleted state, any storage-related charges for customer-managed key encryption will continue to accrue during the soft delete retention period.
190188

191189
## Next steps
192190

@@ -198,6 +196,6 @@ Learn more:
198196

199197
Reference infrastructure-as-code templates:
200198

201-
* [Bicep sample for CMK encyption for Azure AI Foundry resource](https://github.com/azure-ai-foundry/foundry-samples/tree/main/samples/microsoft/infrastructure-setup/30-customer-managed-keys)
202-
* [Bicep sample for CMK encyption for Azure AI Foundry resource and Agent service standard setup](https://github.com/azure-ai-foundry/foundry-samples/tree/main/samples/microsoft/infrastructure-setup/31-customer-managed-keys-standard-agent)
199+
* [Bicep sample for CMK encryption for Azure AI Foundry resource](https://github.com/azure-ai-foundry/foundry-samples/tree/main/samples/microsoft/infrastructure-setup/30-customer-managed-keys)
200+
* [Bicep sample for CMK encryption for Azure AI Foundry resource and Agent service standard setup](https://github.com/azure-ai-foundry/foundry-samples/tree/main/samples/microsoft/infrastructure-setup/31-customer-managed-keys-standard-agent)
203201
* [Bicep sample for CMK encryption for Azure AI hub](https://github.com/azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.machinelearningservices/aistudio-cmk-service-side-encryption).

0 commit comments

Comments
 (0)