Skip to content

Commit 078e5fa

Browse files
authored
Edit to raise acrolinx score above minimum
1 parent 0af255a commit 078e5fa

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/sentinel/customer-managed-keys.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This article provides background information and steps to configure a [customer-
2626

2727
- The Microsoft Sentinel CMK capability is provided only to *workspaces in Log Analytics dedicated clusters* that have *not already been onboarded to Microsoft Sentinel*.
2828

29-
- The following CMK-related changes *are not supported* because they will be ineffective (Microsoft Sentinel data will continue to be encrypted only by the Microsoft-managed key, and not by the CMK):
29+
- The following CMK-related changes *are not supported* because they are ineffective (Microsoft Sentinel data continues to be encrypted only by the Microsoft-managed key, and not by the CMK):
3030

3131
- Enabling CMK on a workspace that's *already onboarded* to Microsoft Sentinel.
3232
- Enabling CMK on a cluster that contains Sentinel-onboarded workspaces.
@@ -47,15 +47,15 @@ This article provides background information and steps to configure a [customer-
4747

4848
## How CMK works
4949

50-
The Microsoft Sentinel solution uses several storage resources for log collection and features, including a Log Analytics dedicated cluster. As part of the Microsoft Sentinel CMK configuration, you will have to configure the CMK settings on the related Log Analytics dedicated cluster. Data saved by Microsoft Sentinel in storage resources other than Log Analytics will also be encrypted using the customer-managed key configured for the dedicated Log Analytics cluster.
50+
The Microsoft Sentinel solution uses several storage resources for log collection and features, including a Log Analytics dedicated cluster. As part of the Microsoft Sentinel CMK configuration, you must configure the CMK settings on the related Log Analytics dedicated cluster. Data saved by Microsoft Sentinel in storage resources other than Log Analytics is also encrypted using the customer-managed key configured for the dedicated Log Analytics cluster.
5151

52-
See the following additional relevant documentation:
52+
For more information, see:
5353
- [Azure Monitor customer-managed keys (CMK)](../azure-monitor/logs/customer-managed-keys.md).
5454
- [Azure Key Vault](../key-vault/general/overview.md).
5555
- [Log Analytics dedicated clusters](../azure-monitor/logs/logs-dedicated-clusters.md).
5656

5757
> [!NOTE]
58-
> If you enable CMK on Microsoft Sentinel, any Public Preview feature that does not support CMK will not be enabled.
58+
> If you enable CMK on Microsoft Sentinel, any Public Preview feature that does not support CMK aren't enabled.
5959
6060
## Enable CMK
6161

@@ -86,7 +86,7 @@ To provision CMK, follow these steps: 
8686

8787
### STEP 2: Enable CMK on your Log Analytics workspace
8888

89-
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/logs/customer-managed-keys.md) in order to create a CMK workspace that will be used as the Microsoft Sentinel workspace in the following steps.
89+
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/logs/customer-managed-keys.md) in order to create a CMK workspace that is used as the Microsoft Sentinel workspace in the following steps.
9090

9191
### STEP 3: Register to the Azure Cosmos DB Resource Provider
9292

@@ -108,13 +108,13 @@ Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://git
108108

109109
## Key Encryption Key revocation or deletion
110110

111-
In the event that a user revokes the key encryption key (the CMK), either by deleting it or removing access for the dedicated cluster and Azure Cosmos DB Resource Provider, Microsoft Sentinel will honor the change and behave as if the data is no longer available, within one hour. At this point, any operation that uses persistent storage resources such as data ingestion, persistent configuration changes, and incident creation, will be prevented. Previously stored data will not be deleted but will remain inaccessible. Inaccessible data is governed by the data-retention policy and will be purged in accordance with that policy.
111+
If a user revokes the key encryption key (the CMK), either by deleting it or removing access for the dedicated cluster and Azure Cosmos DB Resource Provider, Microsoft Sentinel honors the change and behave as if the data is no longer available, within one hour. At this point, any operation that uses persistent storage resources such as data ingestion, persistent configuration changes, and incident creation, is prevented. Previously stored data isn't deleted but remains inaccessible. Inaccessible data is governed by the data-retention policy and is purged in accordance with that policy.
112112

113113
The only operation possible after the encryption key is revoked or deleted is account deletion.
114114

115-
If access is restored after revocation, Microsoft Sentinel will restore access to the data within an hour.
115+
If access is restored after revocation, Microsoft Sentinel restores access to the data within an hour.
116116

117-
Access to the data can be revoked by disabling the customer-managed key in the key vault, or deleting the access policy to the key, for both the dedicated Log Analytics cluster and Azure Cosmos DB. Revoking access by removing the key from the dedicated Log Analytics cluster, or by removing the identity associated with the dedicated Log Analytics cluster is not supported.
117+
Access to the data can be revoked by disabling the customer-managed key in the key vault, or deleting the access policy to the key, for both the dedicated Log Analytics cluster and Azure Cosmos DB. Revoking access by removing the key from the dedicated Log Analytics cluster, or by removing the identity associated with the dedicated Log Analytics cluster isn't supported.
118118

119119
To understand more about how this works in Azure Monitor, see [Azure Monitor CMK revocation](../azure-monitor/logs/customer-managed-keys.md#key-revocation).
120120

@@ -132,7 +132,7 @@ After rotating a key, you must explicitly update the dedicated Log Analytics clu
132132

133133
## Replacing a customer-managed key
134134

135-
Microsoft Sentinel does not support replacing a customer-managed key. You should use the [key rotation capability](#customer-managed-key-rotation) instead.
135+
Microsoft Sentinel doesn't support replacing a customer-managed key. You should use the [key rotation capability](#customer-managed-key-rotation) instead.
136136

137137
## Next steps
138138
In this document, you learned how to set up a customer-managed key in Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:

0 commit comments

Comments
 (0)