Skip to content

Commit 12dad23

Browse files
Merge pull request #219506 from v-amallick/main
CMK article updates
2 parents 265dc70 + 670cfb4 commit 12dad23

File tree

1 file changed

+16
-12
lines changed

1 file changed

+16
-12
lines changed

articles/backup/encryption-at-rest-with-cmk.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Encryption of backup data using customer-managed keys
33
description: Learn how Azure Backup allows you to encrypt your backup data using customer-managed keys (CMK).
44
ms.topic: conceptual
5-
ms.date: 12/02/2021
5+
ms.date: 11/24/2022
66
ms.custom: devx-track-azurepowershell-azurecli, devx-track-azurecli
77
author: v-amallick
88
ms.service: backup
@@ -15,18 +15,20 @@ Azure Backup allows you to encrypt your backup data using customer-managed keys
1515

1616
The encryption key used for encrypting backups may be different from the one used for the source. The data is protected using an AES 256 based data encryption key (DEK), which in turn, is protected using your key encryption keys (KEK). This provides you with full control over the data and the keys. To allow encryption, you must grant Recovery Services vault the permissions to access the encryption key in the Azure Key Vault. You can change the key when required.
1717

18-
This article discusses about how to:
18+
In this article, you'll learn how to:
1919

20-
- Create a Recovery Services vault
21-
- Configure your Recovery Services vault to encrypt the backup data using customer-managed keys (CMK)
22-
- Back up to vaults encrypted using customer-managed keys
23-
- Restore data from backups
20+
> [!div class="checklist"]
21+
>
22+
> - Create a Recovery Services vault
23+
> - Configure the Recovery Services vault to encrypt the backup data using customer-managed keys (CMK)
24+
> - Back up to vaults encrypted using customer-managed keys
25+
> - Restore data from backups
2426
2527
## Before you start
2628

2729
- This feature allows you to encrypt **new Recovery Services vaults only**. Any vaults containing existing items registered or attempted to be registered to it aren't supported.
2830

29-
- Once enabled for a Recovery Services vault, encryption using customer-managed keys can't be reverted to use platform-managed keys (default). You can change the encryption keys as per the requirements.
31+
- After you enable it for a Recovery Services vault, encryption using customer-managed keys can't be reverted to use platform-managed keys (default). You can change the encryption keys as per the requirements.
3032

3133
- This feature currently **doesn't support backup using MARS agent**, and you may not be able to use a CMK-encrypted vault for the same. The MARS agent uses a user passphrase-based encryption. This feature also doesn't support backup of classic VMs.
3234

@@ -351,7 +353,9 @@ To assign the key and follow the steps, choose a client:
351353
352354
2. Select **Update** under **Encryption Settings**.
353355
354-
3. In the Encryption Settings pane, select **Use your own key** and continue to specify the key using one of the following ways. **Ensure that the key you want to use is an RSA 2048 key, which is in an enabled state.**
356+
3. In the Encryption Settings pane, select **Use your own key** and continue to specify the key using one of the following ways.
357+
358+
*Ensure that you use an RSA key, which is in enabled state.*
355359
356360
1. Enter the **Key URI** with which you want to encrypt the data in this Recovery Services vault. You also need to specify the subscription in which the Azure Key Vault (that contains this key) is present. This key URI can be obtained from the corresponding key in your Azure Key Vault. Ensure the key URI is copied correctly. It's recommended that you use the **Copy to clipboard** button provided with the key identifier.
357361
@@ -460,7 +464,7 @@ Data stored in the Recovery Services vault can be restored according to the step
460464

461465
#### Restore VM/disk
462466

463-
1. When recovering disk / VM from a "Snapshot" recovery point, the restored data will be encrypted with the DES used for encrypting the source VM's disks.
467+
1. When you recover disk / VM from a *Snapshot* recovery point, the restored data will be encrypted with the DES used for encrypting the source VM's disks.
464468

465469
1. When restoring disk / VM from a recovery point with Recovery Type as "Vault", you can choose to have the restored data encrypted using a DES, specified at the time of restore. Alternatively, you can choose to continue with the restore the data without specifying a DES, in which case it will be encrypted using Microsoft-managed keys.
466470

@@ -517,11 +521,11 @@ az backup restore restore-disks --container-name MyContainer --disk-encryption-s
517521

518522
#### Restore files
519523

520-
When performing a file restore, the restored data will be encrypted with the key used for encrypting the target location.
524+
When you perform a file restore, the restored data will be encrypted with the key used for encrypting the target location.
521525

522526
### Restore SAP HANA/SQL databases in Azure VMs
523527

524-
When restoring from a backed-up SAP HANA/SQL database running in an Azure VM, the restored data will be encrypted using the encryption key used at the target storage location. It may be a customer-managed key or a platform-managed key used for encrypting the disks of the VM.
528+
When you restore from a backed-up SAP HANA/SQL database running in an Azure VM, the restored data will be encrypted using the encryption key used at the target storage location. It may be a customer-managed key or a platform-managed key used for encrypting the disks of the VM.
525529

526530
## Additional topics
527531

@@ -548,7 +552,7 @@ When your subscription is allow-listed, the **Backup Encryption** tab will displ
548552

549553
1. Specify the user assigned managed identity to manage encryption with customer-managed keys. Click **Select** to browse and select the required identity.
550554

551-
1. Once done, proceed to add Tags (optional) and continue creating the vault.
555+
1. Proceed to add Tags (optional) and continue creating the vault.
552556

553557
### Enable auto-rotation of encryption keys
554558

0 commit comments

Comments
 (0)