You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/disk-encryption.md
+30-26Lines changed: 30 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,15 @@
2
2
title: Server-side encryption of Azure Managed Disks - Azure CLI
3
3
description: Azure Storage protects your data by encrypting it at rest before persisting it to Storage clusters. You can rely on Microsoft-managed keys for the encryption of your managed disks, or you can use customer-managed keys to manage encryption with your own keys.
4
4
author: roygara
5
-
ms.date: 01/13/2020
5
+
6
+
ms.date: 03/12/2020
6
7
ms.topic: conceptual
7
8
ms.author: rogarana
8
9
ms.service: virtual-machines-linux
9
10
ms.subservice: disks
10
11
---
11
12
12
-
# Serverside encryption of Azure managed disks
13
+
# Server-side encryption of Azure managed disks
13
14
14
15
Azure managed disks automatically encrypt your data by default when persisting it to the cloud. Server-side encryption protects your data and helps you meet your organizational security and compliance commitments. Data in Azure managed disks is encrypted transparently using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard), one of the strongest block ciphers available, and is FIPS 140-2 compliant.
15
16
@@ -25,15 +26,19 @@ The following sections describe each of the options for key management in greate
25
26
26
27
## Platform-managed keys
27
28
28
-
By default, managed disks use platform-managed encryption keys. As of June 10, 2017, all new managed disks, snapshots, images, and new data written to existing managed disks are automatically encrypted-at-rest with platform-managed keys.
29
+
By default, managed disks use platform-managed encryption keys. As of June 10, 2017, all new managed disks, snapshots, images, and new data written to existing managed disks are automatically encrypted-at-rest with platform-managed keys.
29
30
30
31
## Customer-managed keys
31
32
32
33
You can choose to manage encryption at the level of each managed disk, with your own keys. Server-side encryption for managed disks with customer-managed keys offers an integrated experience with Azure Key Vault. You can either import [your RSA keys](../../key-vault/key-vault-hsm-protected-keys.md) to your Key Vault or generate new RSA keys in Azure Key Vault. Azure managed disks handles the encryption and decryption in a fully transparent fashion using [envelope encryption](../../storage/common/storage-client-side-encryption.md#encryption-and-decryption-via-the-envelope-technique). It encrypts data using an [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) 256 based data encryption key (DEK), which is, in turn, protected using your keys. You have to grant access to managed disks in your Key Vault to use your keys for encrypting and decrypting the DEK. This allows you full control of your data and keys. You can disable your keys or revoke access to managed disks at any time. You can also audit the encryption key usage with Azure Key Vault monitoring to ensure that only managed disks or other trusted Azure services are accessing your keys.
33
34
35
+
For premium SSDs, standard SSDs, and standard HDDs: When you disable or delete your key, any VMs with disks using that key will automatically shut down. After this, the VMs will not be usable unless the key is enabled again or you assign a new key.
36
+
37
+
For ultra disks, when you disable or delete a key, any VMs with ultra disks using the key won't automatically shut down. Once you deallocate and restart the VMs then the disks will stop using the key and then VMs won't come back online. To bring the VMs back online, you must assign a new key or enable the existing key.
38
+
34
39
The following diagram shows how managed disks use Azure Active Directory and Azure Key Vault to make requests using the customer-managed key:
35
40
36
-

41
+

37
42
38
43
39
44
The following list explains the diagram in even more detail:
@@ -51,15 +56,14 @@ To revoke access to customer-managed keys, see [Azure Key Vault PowerShell](http
51
56
52
57
### Supported regions
53
58
54
-
Only the following regions are currently supported:
55
-
56
-
- Available as a GA offering in the East US, West US 2, and South Central US regions.
57
-
- Available as a public preview in the West Central US, East US 2, Canada Central, and North Europe regions.
For now, customer-managed keys have the following restrictions:
62
64
65
+
- If this feature is enabled for your disk, you cannot disable it.
66
+
If you need to work around this, you must [copy all the data](disks-upload-vhd-to-managed-disk-cli.md#copy-a-managed-disk) to an entirely different managed disk that isn't using customer-managed keys.
63
67
- Only ["soft" and "hard" RSA keys](../../key-vault/about-keys-secrets-and-certificates.md#keys-and-key-types) of size 2080 are supported, no other keys or sizes.
64
68
- Disks created from custom images that are encrypted using server-side encryption and customer-managed keys must be encrypted using the same customer-managed keys and must be in the same subscription.
65
69
- Snapshots created from disks that are encrypted with server-side encryption and customer-managed keys must be encrypted with the same customer-managed keys.
@@ -94,28 +98,28 @@ For now, customer-managed keys have the following restrictions:
94
98
az keyvault key create --vault-name $keyVaultName -n $keyName --protection software
95
99
```
96
100
97
-
1.Create an instance of a DiskEncryptionSet.
101
+
1.Create an instance of a DiskEncryptionSet.
98
102
99
-
```azurecli
100
-
keyVaultId=$(az keyvault show --name $keyVaultName --query [id] -o tsv)
1. Grant the DiskEncryptionSet resource access to the key vault.
108
-
109
-
> [!NOTE]
110
-
> It may take few minutes for Azure to create the identity of your DiskEncryptionSet in your Azure Active Directory. If you get an error like "Cannot find the Active Directory object" when running the following command, wait a few minutes and try again.
103
+
```azurecli
104
+
keyVaultId=$(az keyvault show --name $keyVaultName --query [id] -o tsv)
1. Grant the DiskEncryptionSet resource access to the key vault.
114
112
115
-
az keyvault set-policy -n $keyVaultName -g $rgName --object-id $desIdentity --key-permissions wrapkey unwrapkey get
113
+
> [!NOTE]
114
+
> It may take few minutes for Azure to create the identity of your DiskEncryptionSet in your Azure Active Directory. If you get an error like "Cannot find the Active Directory object" when running the following command, wait a few minutes and try again.
116
115
117
-
az role assignment create --assignee $desIdentity --role Reader --scope $keyVaultId
description: Azure Storage protects your data by encrypting it at rest before persisting it to Storage clusters. You can rely on Microsoft-managed keys for the encryption of your managed disks, or you can use customer-managed keys to manage encryption with your own keys.
4
4
author: roygara
5
5
6
-
ms.date: 01/10/2020
6
+
ms.date: 03/12/2020
7
7
ms.topic: conceptual
8
8
ms.author: rogarana
9
9
ms.service: virtual-machines-windows
10
10
ms.subservice: disks
11
11
---
12
12
13
-
# Serverside encryption of Azure managed disks
13
+
# Server-side encryption of Azure managed disks
14
14
15
-
Azure managed disks automatically encrypt your data by default when persisting it to the cloud. Server-side encryption protects your data and helps you meet your organizational security and compliance commitments. Data in Azure managed disks is encrypted transparently using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard), one of the strongest block ciphers available, and is FIPS 140-2 compliant.
15
+
Azure managed disks automatically encrypt your data by default when persisting it to the cloud. Server-side encryption protects your data and helps you meet your organizational security and compliance commitments. Data in Azure managed disks is encrypted transparently using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard), one of the strongest block ciphers available, and is FIPS 140-2 compliant.
16
16
17
17
Encryption does not impact the performance of managed disks. There is no additional cost for the encryption.
18
18
@@ -26,18 +26,22 @@ The following sections describe each of the options for key management in greate
26
26
27
27
## Platform-managed keys
28
28
29
-
By default, managed disks use platform-managed encryption keys. As of June 10, 2017, all new managed disks, snapshots, images, and new data written to existing managed disks are automatically encrypted-at-rest with platform-managed keys.
29
+
By default, managed disks use platform-managed encryption keys. As of June 10, 2017, all new managed disks, snapshots, images, and new data written to existing managed disks are automatically encrypted-at-rest with platform-managed keys.
30
30
31
31
## Customer-managed keys
32
32
33
33
You can choose to manage encryption at the level of each managed disk, with your own keys. Server-side encryption for managed disks with customer-managed keys offers an integrated experience with Azure Key Vault. You can either import [your RSA keys](../../key-vault/key-vault-hsm-protected-keys.md) to your Key Vault or generate new RSA keys in Azure Key Vault. Azure managed disks handles the encryption and decryption in a fully transparent fashion using [envelope encryption](../../storage/common/storage-client-side-encryption.md#encryption-and-decryption-via-the-envelope-technique). It encrypts data using an [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) 256 based data encryption key (DEK), which is, in turn, protected using your keys. You have to grant access to managed disks in your Key Vault to use your keys for encrypting and decrypting the DEK. This allows you full control of your data and keys. You can disable your keys or revoke access to managed disks at any time. You can also audit the encryption key usage with Azure Key Vault monitoring to ensure that only managed disks or other trusted Azure services are accessing your keys.
34
34
35
+
For premium SSDs, standard SSDs, and standard HDDs: When you disable or delete your key, any VMs with disks using that key will automatically shut down. After this, the VMs will not be usable unless the key is enabled again or you assign a new key.
36
+
37
+
For ultra disks, when you disable or delete a key, any VMs with ultra disks using the key won't automatically shut down. Once you deallocate and restart the VMs then the disks will stop using the key and then VMs won't come back online. To bring the VMs back online, you must assign a new key or enable the existing key.
38
+
35
39
The following diagram shows how managed disks use Azure Active Directory and Azure Key Vault to make requests using the customer-managed key:
36
40
37
-

41
+

38
42
39
43
40
-
The following list explains the diagram in even more detail:
44
+
The following list explains the diagram in more detail:
41
45
42
46
1. An Azure Key Vault administrator creates key vault resources.
43
47
1. The key vault admin either imports their RSA keys to Key Vault or generate new RSA keys in Key Vault.
@@ -52,15 +56,14 @@ To revoke access to customer-managed keys, see [Azure Key Vault PowerShell](http
52
56
53
57
### Supported regions
54
58
55
-
Only the following regions are currently supported:
56
-
57
-
- Available as a GA offering in the East US, West US 2, South Central US, UK South regions.
58
-
- Available as a public preview in the West Central US, East US 2, Canada Central, and North Europe regions.
For now, customer-managed keys have the following restrictions:
63
64
65
+
- If this feature is enabled for your disk, you cannot disable it.
66
+
If you need to work around this, you must [copy all the data](disks-upload-vhd-to-managed-disk-powershell.md#copy-a-managed-disk) to an entirely different managed disk that isn't using customer-managed keys.
64
67
- Only ["soft" and "hard" RSA keys](../../key-vault/about-keys-secrets-and-certificates.md#keys-and-key-types) of size 2080 are supported, no other keys or sizes.
65
68
- Disks created from custom images that are encrypted using server-side encryption and customer-managed keys must be encrypted using the same customer-managed keys and must be in the same subscription.
66
69
- Snapshots created from disks that are encrypted with server-side encryption and customer-managed keys must be encrypted with the same customer-managed keys.
@@ -93,26 +96,26 @@ For now, customer-managed keys have the following restrictions:
1.Grant the DiskEncryptionSet resource access to the key vault.
105
-
106
-
> [!NOTE]
107
-
> It may take few minutes for Azure to create the identity of your DiskEncryptionSet in your Azure Active Directory. If you get an error like "Cannot find the Active Directory object" when running the following command, wait a few minutes and try again.
1.Grant the DiskEncryptionSet resource access to the key vault.
108
+
109
+
> [!NOTE]
110
+
> It may take few minutes for Azure to create the identity of your DiskEncryptionSet in your Azure Active Directory. If you get an error like "Cannot find the Active Directory object" when running the following command, wait a few minutes and try again.
0 commit comments