You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -15,18 +15,20 @@ Azure Backup allows you to encrypt your backup data using customer-managed keys
15
15
16
16
The encryption key used for encrypting backups may be different from the one used for the source. The data is protected using an AES 256 based data encryption key (DEK), which in turn, is protected using your key encryption keys (KEK). This provides you with full control over the data and the keys. To allow encryption, you must grant Recovery Services vault the permissions to access the encryption key in the Azure Key Vault. You can change the key when required.
17
17
18
-
This article discusses about how to:
18
+
In this article, you'll learn how to:
19
19
20
-
- Create a Recovery Services vault
21
-
- Configure your Recovery Services vault to encrypt the backup data using customer-managed keys (CMK)
22
-
- Back up to vaults encrypted using customer-managed keys
23
-
- Restore data from backups
20
+
> [!div class="checklist"]
21
+
>
22
+
> - Create a Recovery Services vault
23
+
> - Configure the Recovery Services vault to encrypt the backup data using customer-managed keys (CMK)
24
+
> - Back up to vaults encrypted using customer-managed keys
25
+
> - Restore data from backups
24
26
25
27
## Before you start
26
28
27
29
- This feature allows you to encrypt **new Recovery Services vaults only**. Any vaults containing existing items registered or attempted to be registered to it aren't supported.
28
30
29
-
-Once enabled for a Recovery Services vault, encryption using customer-managed keys can't be reverted to use platform-managed keys (default). You can change the encryption keys as per the requirements.
31
+
-After you enable it for a Recovery Services vault, encryption using customer-managed keys can't be reverted to use platform-managed keys (default). You can change the encryption keys as per the requirements.
30
32
31
33
- This feature currently **doesn't support backup using MARS agent**, and you may not be able to use a CMK-encrypted vault for the same. The MARS agent uses a user passphrase-based encryption. This feature also doesn't support backup of classic VMs.
32
34
@@ -351,7 +353,9 @@ To assign the key and follow the steps, choose a client:
351
353
352
354
2. Select **Update** under **Encryption Settings**.
353
355
354
-
3. In the Encryption Settings pane, select **Use your own key** and continue to specify the key using one of the following ways. **Ensure that the key you want to use is an RSA 2048 key, which is in an enabled state.**
356
+
3. In the Encryption Settings pane, select **Use your own key** and continue to specify the key using one of the following ways.
357
+
358
+
*Ensure that you use an RSA key, which is in enabled state.*
355
359
356
360
1. Enter the **Key URI** with which you want to encrypt the data in this Recovery Services vault. You also need to specify the subscription in which the Azure Key Vault (that contains this key) is present. This key URI can be obtained from the corresponding key in your Azure Key Vault. Ensure the key URI is copied correctly. It's recommended that you use the **Copy to clipboard** button provided with the key identifier.
357
361
@@ -460,7 +464,7 @@ Data stored in the Recovery Services vault can be restored according to the step
460
464
461
465
#### Restore VM/disk
462
466
463
-
1. When recovering disk / VM from a "Snapshot" recovery point, the restored data will be encrypted with the DES used for encrypting the source VM's disks.
467
+
1. When you recover disk / VM from a *Snapshot* recovery point, the restored data will be encrypted with the DES used for encrypting the source VM's disks.
464
468
465
469
1. When restoring disk / VM from a recovery point with Recovery Type as "Vault", you can choose to have the restored data encrypted using a DES, specified at the time of restore. Alternatively, you can choose to continue with the restore the data without specifying a DES, in which case it will be encrypted using Microsoft-managed keys.
When performing a file restore, the restored data will be encrypted with the key used for encrypting the target location.
524
+
When you perform a file restore, the restored data will be encrypted with the key used for encrypting the target location.
521
525
522
526
### Restore SAP HANA/SQL databases in Azure VMs
523
527
524
-
When restoring from a backed-up SAP HANA/SQL database running in an Azure VM, the restored data will be encrypted using the encryption key used at the target storage location. It may be a customer-managed key or a platform-managed key used for encrypting the disks of the VM.
528
+
When you restore from a backed-up SAP HANA/SQL database running in an Azure VM, the restored data will be encrypted using the encryption key used at the target storage location. It may be a customer-managed key or a platform-managed key used for encrypting the disks of the VM.
525
529
526
530
## Additional topics
527
531
@@ -548,7 +552,7 @@ When your subscription is allow-listed, the **Backup Encryption** tab will displ
548
552
549
553
1. Specify the user assigned managed identity to manage encryption with customer-managed keys. Click **Select** to browse and select the required identity.
550
554
551
-
1.Once done, proceed to add Tags (optional) and continue creating the vault.
555
+
1.Proceed to add Tags (optional) and continue creating the vault.
0 commit comments