Skip to content

Commit 14c30a7

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-roles-oct
2 parents 219c5a1 + a4f28d8 commit 14c30a7

File tree

3 files changed

+14
-20
lines changed

3 files changed

+14
-20
lines changed

articles/azure-government/documentation-government-impact-level-5.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.custom: references_regions, ignite-2022
77
author: stevevi
88
ms.author: stevevi
99
recommendations: false
10-
ms.date: 07/14/2022
10+
ms.date: 10/21/2022
1111
---
1212

1313
# Isolation guidelines for Impact Level 5 workloads
@@ -171,21 +171,17 @@ Virtual machine scale sets aren't currently supported on Azure Dedicated Host. B
171171
> [!IMPORTANT]
172172
> As new hardware generations become available, some VM types might require reconfiguration (scale up or migration to a new VM SKU) to ensure they remain on properly dedicated hardware. For more information, see **[Virtual machine isolation in Azure](../virtual-machines/isolation.md).**
173173
174-
#### Disk encryption for virtual machines
174+
#### Disk encryption options
175175

176-
You can encrypt the storage that supports these virtual machines in one of two ways to support necessary encryption standards.
176+
There are several types of encryption available for your managed disks supporting virtual machines and virtual machine scale sets:
177177

178-
- Use Azure Disk Encryption to encrypt the drives by using dm-crypt (Linux) or BitLocker (Windows):
179-
- [Enable Azure Disk Encryption for Linux](../virtual-machines/linux/disk-encryption-overview.md)
180-
- [Enable Azure Disk Encryption for Windows](../virtual-machines/windows/disk-encryption-overview.md)
181-
- Use Azure Storage service encryption for storage accounts with your own key to encrypt the storage account that holds the disks:
182-
- [Storage service encryption with customer-managed keys](../storage/common/customer-managed-keys-configure-key-vault.md)
178+
- Azure Disk Encryption
179+
- Server-side encryption of Azure Disk Storage
180+
- Encryption at host
181+
- Confidential disk encryption
183182

184-
#### Disk encryption for virtual machine scale sets
183+
All these options enable you to have sole control over encryption keys. For more information, see [Overview of managed disk encryption options](../virtual-machines/disk-encryption-overview.md).
185184

186-
You can encrypt disks that support virtual machine scale sets by using Azure Disk Encryption:
187-
188-
- [Encrypt disks in virtual machine scale sets](../virtual-machine-scale-sets/disk-encryption-key-vault.md)
189185

190186
## Containers
191187

articles/azure-government/documentation-government-overview-jps.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.topic: article
66
author: stevevi
77
ms.author: stevevi
88
recommendations: false
9-
ms.date: 08/30/2022
9+
ms.date: 10/30/2022
1010
---
1111

12-
# Public safety and justice in Azure Government
12+
# Azure for public safety and justice
1313

1414
## Overview
1515

@@ -29,7 +29,7 @@ Microsoft treats Criminal Justice Information Services (CJIS) compliance as a co
2929

3030
The [Criminal Justice Information Services](https://www.fbi.gov/services/cjis) (CJIS) Division of the US Federal Bureau of Investigation (FBI) gives state, local, and federal law enforcement and criminal justice agencies access to criminal justice information (CJI), for example, fingerprint records and criminal histories. Law enforcement and other government agencies in the United States must ensure that their use of cloud services for the transmission, storage, or processing of CJI complies with the [CJIS Security Policy](https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center/view), which establishes minimum security requirements and controls to safeguard CJI.
3131

32-
### Azure Government and CJIS Security Policy
32+
### Azure and CJIS Security Policy
3333

3434
Microsoft's commitment to meeting the applicable CJIS regulatory controls help criminal justice organizations be compliant with the CJIS Security Policy when implementing cloud-based solutions. For more information about Azure support for CJIS, see [Azure CJIS compliance offering](/azure/compliance/offerings/offering-cjis).
3535

@@ -77,7 +77,7 @@ While the current CMVP FIPS 140 implementation guidance precludes a FIPS 140 val
7777

7878
Proper protection and management of encryption keys is essential for data security. [Azure Key Vault](../key-vault/index.yml) is a cloud service for securely storing and managing secrets. Key Vault enables you to store your encryption keys in hardware security modules (HSMs) that are FIPS 140 validated. For more information, see [Data encryption key management](./azure-secure-isolation-guidance.md#data-encryption-key-management).
7979

80-
With Key Vault, you can import or generate encryption keys in HSMs, ensuring that keys never leave the HSM protection boundary to support *bring your own key* (BYOK) scenarios. Keys generated inside the Key Vault HSMs aren't exportable – there can be no clear-text version of the key outside the HSMs. This binding is enforced by the underlying HSM. **Azure Key Vault is designed, deployed, and operated such that Microsoft and its agents don't see or extract your cryptographic keys.** For extra assurances, see [How does Azure Key Vault protect your keys?](../key-vault/managed-hsm/mhsm-control-data.md#how-does-azure-key-vault-managed-hsm-protect-your-keys) Therefore, if you use CMK stored in Azure Key Vault HSMs, you effectively maintain sole ownership of encryption keys.
80+
With Key Vault, you can import or generate encryption keys in HSMs, ensuring that keys never leave the HSM protection boundary to support *bring your own key* (BYOK) scenarios. Keys generated inside the Key Vault HSMs aren't exportable – there can be no clear-text version of the key outside the HSMs. This binding is enforced by the underlying HSM. **Azure Key Vault is designed, deployed, and operated such that Microsoft and its agents don't see or extract your cryptographic keys.** For more information, see [How does Azure Key Vault protect your keys?](../key-vault/managed-hsm/mhsm-control-data.md#how-does-azure-key-vault-managed-hsm-protect-your-keys) Therefore, if you use CMK stored in Azure Key Vault HSMs, you effectively maintain sole ownership of encryption keys.
8181

8282
### Data encryption in transit
8383

@@ -99,8 +99,6 @@ Technologies like [Intel Software Guard Extensions](https://software.intel.com/s
9999

100100
Insider threat is characterized as potential for providing back-door connections and cloud service provider (CSP) privileged administrator access to your systems and data. For more information on how Microsoft restricts insider access to your data, see [Restrictions on insider access](./documentation-government-plan-security.md#restrictions-on-insider-access).
101101

102-
All Azure and Azure Government employees in the United States are subject to Microsoft background checks. For more information, see [Screening](./documentation-government-plan-security.md#screening). Azure Government provides you with an extra layer of protection through contractual commitments regarding storage of your data in the United States and limiting potential access to systems processing your data to screened US persons that have completed fingerprint background checks and criminal records checks to address CJIS requirements.
103-
104102
## Monitoring your Azure resources
105103

106104
Azure provides essential services that you can use to gain in-depth insight into your provisioned Azure resources and get alerted about suspicious activity, including outside attacks aimed at your applications and data. For more information about these services, see [Customer monitoring of Azure resources](./documentation-government-plan-security.md#customer-monitoring-of-azure-resources).

articles/devtest-labs/create-lab-windows-vm-bicep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Create a lab in Azure DevTest Labs using Bicep
33
description: Use Bicep to create a lab that has a virtual machine in Azure DevTest Labs.
4-
author: femila
4+
ms.author: rosemalcolm
5+
author: RoseHJM
56
ms.topic: quickstart
6-
ms.author: femila
77
ms.custom: subject-armqs, mode-arm
88
ms.date: 03/22/2022
99
---

0 commit comments

Comments
 (0)