You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/transparent-data-encryption-byok-azure-sql.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,13 +10,13 @@ ms.topic: conceptual
10
10
author: aliceku
11
11
ms.author: aliceku
12
12
ms.reviewer: vanto
13
-
ms.date: 11/04/2019
13
+
ms.date: 11/19/2019
14
14
---
15
15
# Azure SQL Transparent Data Encryption with customer-managed key
16
16
17
17
Azure SQL [Transparent Data Encryption (TDE)](https://docs.microsoft.com/sql/relational-databases/security/encryption/transparent-data-encryption) with customer-managed key enables Bring Your Own Key (BYOK) scenario for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed transparent data encryption, customer is responsible for and in a full control of a key lifecycle management (key creation, upload, rotation, deletion), key usage permissions, and auditing of operations on keys.
18
18
19
-
In this scenario, the key used for encryption of the Database Encryption Key (DEK), called TDE protector, is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), a cloud-based external key management system. Key Vault is highly available and scalable secure storage for RSA cryptographic keys, backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key, but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the key vault, imported, or [transferred to the key vault from an on-prem HSM device](https://docs.microsoft.com/azure/key-vault/key-vault-hsm-protected-keys).
19
+
In this scenario, the key used for encryption of the Database Encryption Key (DEK), called TDE protector, is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), a cloud-based external key management system. Key Vault is highly available and scalable secure storage for RSA cryptographic keys, optionally backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key, but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the key vault, imported, or [transferred to the key vault from an on-prem HSM device](https://docs.microsoft.com/azure/key-vault/key-vault-hsm-protected-keys).
20
20
21
21
For Azure SQL Database and Azure SQL Data Warehouse, the TDE protector is set at the logical server level and is inherited by all encrypted databases associated with that server. For Azure SQL Managed Instance, the TDE protector is set at the instance level and is inherited by all encrypted databases on that instance. The term *server* refers both to SQL Database logical server and managed instance throughout this document, unless stated differently.
22
22
@@ -76,9 +76,9 @@ Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging i
76
76
77
77
- TDE protector can be only asymmetric, RSA 2048 or RSA HSM 2048 key.
78
78
79
-
- The key cannot have activation or expiration date set.
79
+
- The key activation date (if set) must be a date and time in the past. Expiration date (if set) must be a future date and time.
80
80
81
-
- The key must be in the Enabled state in the key vault.
81
+
- The key must be in the *Enabled* state.
82
82
83
83
- If you are importing existing key into the key vault, make sure to provide it in the supported file formats (.pfx, .byok, or .backup).
0 commit comments