Skip to content

Commit 01e2caa

Browse files
committed
Update concepts-data-encryption.md
1 parent 4424cc7 commit 01e2caa

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/postgresql/flexible-server/concepts-data-encryption.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,13 @@ ms.reviewer: maghan
1010
ms.date: 10/12/2022
1111
---
1212

13-
# Azure Database for PostgreSQL - Flexible Server Data Encryption with a Customer-managed Key Preview
13+
# Azure Database for PostgreSQL - Flexible Server Data Encryption with a Customer-managed Key
1414

1515
[!INCLUDE [applies-to-postgresql-flexible-server](../includes/applies-to-postgresql-flexible-server.md)]
1616

17+
> [!NOTE]
18+
> Azure Database for PostgreSQL - Flexible Server Data Encryption with a Customer-managed Key is currently in preview.
19+
1720
Azure PostgreSQL uses [Azure Storage encryption](../../storage/common/storage-service-encryption.md) to encrypt data at-rest by default using Microsoft-managed keys. For Azure PostgreSQL users, it's similar to Transparent Data Encryption (TDE) in other databases such as SQL Server. Many organizations require full control of access to the data using a customer-managed key. Data encryption with customer-managed keys for Azure Database for PostgreSQL Flexible server - Preview enables you to bring your key (BYOK) for data protection at rest. It also allows organizations to implement separation of duties in the management of keys and data. With customer-managed encryption, you're responsible for, and in full control of, a key's lifecycle, key usage permissions, and auditing of operations on keys.
1821

1922
Data encryption with customer-managed keys for Azure Database for PostgreSQL Flexible server - Preview is set at the server level. For a given server, a customer-managed key, called the key encryption key (KEK), is used to encrypt the service's data encryption key (DEK). The KEK is an asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault](https://azure.microsoft.com/services/key-vault/)) instance. The Key Encryption Key (KEK) and Data Encryption Key (DEK) are described in more detail later in this article.
@@ -60,7 +63,7 @@ The key vault administrator can also [enable logging of Key Vault audit events](
6063

6164
When the server is configured to use the customer-managed key stored in the key Vault, the server sends the DEK to the key Vault for encryptions. Key Vault returns the encrypted DEK stored in the user database. Similarly, when needed, the server sends the protected DEK to the key Vault for decryption. Auditors can use Azure Monitor to review Key Vault audit event logs, if logging is enabled.
6265

63-
## Requirements for configuring data encryption in preview for Azure Database for PostgreSQL Flexible server
66+
## Requirements for configuring data encryption for Azure Database for PostgreSQL Flexible server
6467

6568
The following are requirements for configuring Key Vault:
6669

0 commit comments

Comments
 (0)