Skip to content

Commit 08fa59c

Browse files
Merge pull request #232282 from jackrichins/patch-65
Update for unified disk encryption recommendation
2 parents f99169a + 3f5aef3 commit 08fa59c

File tree

1 file changed

+22
-11
lines changed

1 file changed

+22
-11
lines changed

articles/virtual-machines/disk-encryption-overview.md

Lines changed: 22 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of managed disk encryption options
33
description: Overview of managed disk encryption options
44
author: msmbaldwin
5-
ms.date: 09/06/2022
5+
ms.date: 03/28/2023
66
ms.topic: conceptual
77
ms.author: mbaldwin
88
ms.service: virtual-machines
@@ -14,11 +14,11 @@ ms.custom: references_regions
1414

1515
There are several types of encryption available for your managed disks, including Azure Disk Encryption (ADE), Server-Side Encryption (SSE) and encryption at host.
1616

17-
- **Azure Disk Encryption** helps protect and safeguard your data to meet your organizational security and compliance commitments. ADE encrypts the OS and data disks of Azure virtual machines (VMs) inside your VMs by using the [DM-Crypt](https://wikipedia.org/wiki/Dm-crypt) feature of Linux or the [BitLocker](https://wikipedia.org/wiki/BitLocker) feature of Windows. ADE is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets. For full details, see [Azure Disk Encryption for Linux VMs](./linux/disk-encryption-overview.md) or [Azure Disk Encryption for Windows VMs](./windows/disk-encryption-overview.md).
17+
- **Azure Disk Storage Server-Side Encryption** (also referred to as encryption-at-rest or Azure Storage encryption) is always enabled and automatically encrypts data stored on Azure managed disks (OS and data disks) when persisting on the Storage Clusters. When configured with a Disk Encryption Set (DES), it supports customer-managed keys as well. It doesn't encrypt temp disks or disk caches. For full details, see [Server-side encryption of Azure Disk Storage](./disk-encryption.md).
1818

19-
- **Azure Disk Storage Server-Side Encryption** (also referred to as encryption-at-rest or Azure Storage encryption) automatically encrypts data stored on Azure managed disks (OS and data disks) when persisting on the Storage Clusters. When configured with a Disk Encryption Set (DES), it supports customer-managed keys as well. For full details, see [Server-side encryption of Azure Disk Storage](./disk-encryption.md).
19+
- **Encryption at host** is a Virtual Machine option that enhances Azure Disk Storage Server-Side Encryption to ensure that all temp disks and disk caches are encrypted at rest and flow encrypted to the Storage clusters. For full details, see [Encryption at host - End-to-end encryption for your VM data](./disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data).
2020

21-
- **Encryption at host** ensures that data stored on the VM host hosting your VM is encrypted at rest and flows encrypted to the Storage clusters. For full details, see [Encryption at host - End-to-end encryption for your VM data](./disk-encryption.md#encryption-at-host---end-to-end-encryption-for-your-vm-data).
21+
- **Azure Disk Encryption** helps protect and safeguard your data to meet your organizational security and compliance commitments. ADE encrypts the OS and data disks of Azure virtual machines (VMs) inside your VMs by using the [DM-Crypt](https://wikipedia.org/wiki/Dm-crypt) feature of Linux or the [BitLocker](https://wikipedia.org/wiki/BitLocker) feature of Windows. ADE is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets. For full details, see [Azure Disk Encryption for Linux VMs](./linux/disk-encryption-overview.md) or [Azure Disk Encryption for Windows VMs](./windows/disk-encryption-overview.md).
2222

2323
- **Confidential disk encryption** binds disk encryption keys to the virtual machine's TPM and makes the protected disk content accessible only to the VM. The TPM and VM guest state is always encrypted in attested code using keys released by a secure protocol that bypasses the hypervisor and host operating system. Currently only available for the OS disk. Encryption at host may be used for other disks on a Confidential VM in addition to Confidential Disk Encryption. For full details, see [DCasv5 and ECasv5 series confidential VMs](../confidential-computing/confidential-vm-overview.md#confidential-os-disk-encryption).
2424

@@ -28,15 +28,26 @@ Encryption is part of a layered approach to security and should be used with oth
2828

2929
Here's a comparison of Disk Storage SSE, ADE, encryption at host, and Confidential disk encryption.
3030

31-
| | Encryption at rest (OS and data disks) | Temp disk encryption | Encryption of caches | Data flows encrypted between Compute and Storage | Customer control of keys | Does not use your VM's CPU | Works for custom images | Enhanced Key Protection | Microsoft Defender for Cloud disk encryption status |
32-
|--|--|--|--|--|--|--|--|--|--|
33-
| **Azure Disk Storage Server-Side Encryption at rest** | ✅ | ❌ | ❌ | ❌ | ✅ When configured with DES | ✅ | ✅ | ❌ | Unhealthy, not applicable if exempt |
34-
| **Azure Disk Encryption** | ✅ | ✅ | ✅ | ✅ | ✅ |❌ | ❌ Does not work for custom Linux images | ❌ | Healthy |
35-
| **Encryption at Host** | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ❌ | Unhealthy, not applicable if exempt |
36-
| **Confidential disk encryption** | ✅ For the OS disk only | ❌ | ✅ For the OS disk only | ✅ For the OS disk only| ✅ For the OS disk only |❌ | ✅ | ✅ | Unhealthy, not applicable if exempt |
31+
| | **Azure Disk Storage Server-Side Encryption** | **Encryption at Host** | **Azure Disk Encryption** | **Confidential disk encryption (For the OS disk only** |
32+
|--|--|--|--|--|
33+
| Encryption at rest (OS and data disks) | ✅ | ✅ | ✅ | ✅ |
34+
| Temp disk encryption | ❌ | ✅ | ✅ | ❌ |
35+
| Encryption of caches | ❌ | ✅ | ✅ | ✅ |
36+
| Data flows encrypted between Compute and Storage | ❌ | ✅ | ✅ | ✅ |
37+
| Customer control of keys | ✅ When configured with DES | ✅ When configured with DES | ✅ | ✅ |
38+
| Does not use your VM's CPU | ✅ | ✅ | ❌ | ❌ |
39+
| Works for custom images | ✅ | ✅ | ❌ Does not work for custom Linux images | ✅ |
40+
| Enhanced Key Protection | ❌ | ❌ | ❌ | ✅ |
41+
| Microsoft Defender for Cloud disk encryption status* | Unhealthy | Healthy | Healthy | Not applicable |
3742

3843
> [!IMPORTANT]
39-
> For Encryption at host and Confidential disk encryption, Microsoft Defender for Cloud does not detect the encryption state. We are in the process of updating Microsoft Defender
44+
> For Confidential disk encryption, Microsoft Defender for Cloud does not currently have a recommendation that is applicable.
45+
46+
\* Microsoft Defender for Cloud has the following disk encryption recommendations:
47+
* [Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F0961003e-5a0a-4549-abde-af6a37f2724d) (Only detects Azure Disk Encryption)
48+
* [\[Preview\]: Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f3dc5edcd-002d-444c-b216-e123bbfa37c0) (Detects both Azure Disk Encryption and EncryptionAtHost)
49+
* [\[Preview\]: Linux virtual machines should enable Azure Disk Encryption or EncryptionAtHost](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2fca88aadc-6e2b-416c-9de2-5a0f01d1693f) (Detects both Azure Disk Encryption and EncryptionAtHost)
50+
4051

4152
## Next steps
4253

0 commit comments

Comments
 (0)