Skip to content

Commit 058da4b

Browse files
authored
Merge pull request #105311 from MladjoA/patch-14
Removing outdated database deletion part
2 parents b452c68 + d2f2400 commit 058da4b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sql-database/transparent-data-encryption-byok-azure-sql-remove-tde-protector.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: jaszymas
1111
ms.author: jaszymas
1212
ms.reviewer: vanto
13-
ms.date: 02/12/2020
13+
ms.date: 02/24/2020
1414
---
1515
# Remove a Transparent Data Encryption (TDE) protector using PowerShell
1616

@@ -37,11 +37,11 @@ For installation, see [Install Azure CLI](/cli/azure/install-azure-cli).
3737

3838
This how-to guide describes how to respond to a potentially compromised TDE protector for an Azure SQL Database or Data Warehouse that is using TDE with customer-managed keys in Azure Key Vault - Bring Your Own Key (BYOK) support. To learn more about BYOK support for TDE, see the [overview page](transparent-data-encryption-byok-azure-sql.md).
3939

40-
The following procedures should only be done in extreme cases or in test environments. Review the how-to guide carefully, as deleting actively used TDE protectors from Azure Key Vault can result in **data loss**.
40+
The following procedures should only be done in extreme cases or in test environments. Review the how-to guide carefully, as deleting actively used TDE protectors from Azure Key Vault will result in **database unavailability**.
4141

4242
If a key is ever suspected to be compromised, such that a service or user had unauthorized access to the key, it’s best to delete the key.
4343

44-
Keep in mind that once the TDE protector is deleted in Key Vault, **all connections to the encrypted databases under the server are blocked, and these databases go offline and get dropped within 24 hours**. Old backups encrypted with the compromised key are no longer accessible.
44+
Keep in mind that once the TDE protector is deleted in Key Vault, in up to 10 minutes all encrypted databases will start denying all connections with the corresponding error message and change its state to [Inaccessible](https://docs.microsoft.com/azure/sql-database/transparent-data-encryption-byok-azure-sql#inaccessible-tde-protector).
4545

4646
The following steps outline how to check the TDE Protector thumbprints still in use by Virtual Log Files (VLF) of a given database.
4747
The thumbprint of the current TDE protector of the database, and the database ID can be found by running:

0 commit comments

Comments
 (0)