Skip to content

Commit 0a197c3

Browse files
committed
[ACR] CMK with AKV firewall
1 parent c603c60 commit 0a197c3

File tree

2 files changed

+8
-2
lines changed

2 files changed

+8
-2
lines changed

articles/container-registry/container-registry-customer-managed-keys.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.custom:
88

99
# Encryption using customer-managed keys
1010

11-
When you store images and other artifacts in an Azure container registry, Azure automatically encrypts the registry content at rest with [service-managed keys](../security/fundamentals/encryption-atrest.md#data-encryption-models). You can supplement default encryption with an additional encryption layer using a key that you create and manage in Azure Key Vault. This article walks you through the steps using the Azure CLI and the Azure portal.
11+
When you store images and other artifacts in an Azure container registry, Azure automatically encrypts the registry content at rest with [service-managed keys](../security/fundamentals/encryption-atrest.md#data-encryption-models). You can supplement default encryption with an additional encryption layer using a key that you create and manages in Azure Key Vault. This article walks you through the steps using the Azure CLI and the Azure portal.
1212

13-
Server-side encryption with customer-managed keys is supported through integration with [Azure Key Vault](../key-vault/key-vault-overview.md). You can create your own encryption keys and store them in a key vault, or you can use Azure Key Vault's APIs to generate encryption keys. With Azure Key Vault, you can also audit key usage.
13+
Server-side encryption with customer-managed keys is supported through integration with [Azure Key Vault](../key-vault/key-vault-overview.md). You can create your own encryption keys and store them in a key vault, or use Azure Key Vault's APIs to generate encryption keys. With Azure Key Vault, you can also audit key usage.
1414

1515
This feature is available in the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry SKUs](container-registry-skus.md).
1616

@@ -384,6 +384,11 @@ az keyvault delete-policy \
384384

385385
Revoking the key effectively blocks access to all registry data, since the registry can't access the encryption key. If access to the key is enabled or the deleted key is restored, your registry will pick the key so you can again access the encrypted registry data.
386386

387+
## Advanced scenarios
388+
389+
* **System-assigned identity** - You can use a registry's system-assigned managed identity to access the key vault for encryption keys. To use the system-assigned identity, you must first enable both a user-assigned identity and the system-assigned identity when creating the registry. Then, configure the system-assigned identity with key vault access. Then, update the registry's encryption key to use the system-assigned identity.
390+
* **Key Vault firewall** - If your Azure key vault is deployed in a virtual network with a Key Vault firewall, you must configure the key vault to allow access by any [trusted service](../key-vault/key-vault-overview-vnet-service-endpoints.md#trusted-services). See [Configure Azure Key Vault firewalls and virtual networks](../key-vault/key-vault-network-security.md). In this case, key vault access for registry encryption is only possible with a registry's system-assigned identity.
391+
387392
## Next steps
388393

389394
* Learn more about [encryption at rest in Azure](../security/fundamentals/encryption-atrest.md).

articles/key-vault/key-vault-overview-vnet-service-endpoints.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,7 @@ Here's a list of trusted services that are allowed to access a key vault if the
7373
|Azure Event Hubs|[Allow access to a key vault for customer-managed keys scenario](https://docs.microsoft.com/azure/event-hubs/configure-customer-managed-key)|
7474
|Azure Service Bus|[Allow access to a key vault for customer-managed keys scenario](https://docs.microsoft.com/azure/service-bus-messaging/configure-customer-managed-key)|
7575
|Azure Import/Export| [Use customer-managed keys in Azure Key Vault for Import/Export service](https://docs.microsoft.com/azure/storage/common/storage-import-export-encryption-key-portal)
76+
|Azure Container Registry|[Registry encryption using customer-managed keys](../container-registry/container-registry-customer-managed-keys.md)
7677

7778
> [!NOTE]
7879
> You must set up the relevant Key Vault access policies to allow the corresponding services to get access to Key Vault.

0 commit comments

Comments
 (0)