You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Isolation guidelines for Impact Level 5 workloads
@@ -171,21 +171,17 @@ Virtual machine scale sets aren't currently supported on Azure Dedicated Host. B
171
171
> [!IMPORTANT]
172
172
> As new hardware generations become available, some VM types might require reconfiguration (scale up or migration to a new VM SKU) to ensure they remain on properly dedicated hardware. For more information, see **[Virtual machine isolation in Azure](../virtual-machines/isolation.md).**
173
173
174
-
#### Disk encryption for virtual machines
174
+
#### Disk encryption options
175
175
176
-
You can encrypt the storage that supports these virtual machines in one of two ways to support necessary encryption standards.
176
+
There are several types of encryption available for your managed disks supporting virtual machines and virtual machine scale sets:
177
177
178
-
- Use Azure Disk Encryption to encrypt the drives by using dm-crypt (Linux) or BitLocker (Windows):
179
-
-[Enable Azure Disk Encryption for Linux](../virtual-machines/linux/disk-encryption-overview.md)
180
-
-[Enable Azure Disk Encryption for Windows](../virtual-machines/windows/disk-encryption-overview.md)
181
-
- Use Azure Storage service encryption for storage accounts with your own key to encrypt the storage account that holds the disks:
182
-
-[Storage service encryption with customer-managed keys](../storage/common/customer-managed-keys-configure-key-vault.md)
178
+
- Azure Disk Encryption
179
+
- Server-side encryption of Azure Disk Storage
180
+
- Encryption at host
181
+
- Confidential disk encryption
183
182
184
-
#### Disk encryption for virtual machine scale sets
183
+
All these options enable you to have sole control over encryption keys. For more information, see [Overview of managed disk encryption options](../virtual-machines/disk-encryption-overview.md).
185
184
186
-
You can encrypt disks that support virtual machine scale sets by using Azure Disk Encryption:
187
-
188
-
-[Encrypt disks in virtual machine scale sets](../virtual-machine-scale-sets/disk-encryption-key-vault.md)
Copy file name to clipboardExpand all lines: articles/azure-government/documentation-government-overview-jps.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,10 +6,10 @@ ms.topic: article
6
6
author: stevevi
7
7
ms.author: stevevi
8
8
recommendations: false
9
-
ms.date: 08/30/2022
9
+
ms.date: 10/30/2022
10
10
---
11
11
12
-
# Public safety and justice in Azure Government
12
+
# Azure for public safety and justice
13
13
14
14
## Overview
15
15
@@ -29,7 +29,7 @@ Microsoft treats Criminal Justice Information Services (CJIS) compliance as a co
29
29
30
30
The [Criminal Justice Information Services](https://www.fbi.gov/services/cjis) (CJIS) Division of the US Federal Bureau of Investigation (FBI) gives state, local, and federal law enforcement and criminal justice agencies access to criminal justice information (CJI), for example, fingerprint records and criminal histories. Law enforcement and other government agencies in the United States must ensure that their use of cloud services for the transmission, storage, or processing of CJI complies with the [CJIS Security Policy](https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center/view), which establishes minimum security requirements and controls to safeguard CJI.
31
31
32
-
### Azure Government and CJIS Security Policy
32
+
### Azure and CJIS Security Policy
33
33
34
34
Microsoft's commitment to meeting the applicable CJIS regulatory controls help criminal justice organizations be compliant with the CJIS Security Policy when implementing cloud-based solutions. For more information about Azure support for CJIS, see [Azure CJIS compliance offering](/azure/compliance/offerings/offering-cjis).
35
35
@@ -77,7 +77,7 @@ While the current CMVP FIPS 140 implementation guidance precludes a FIPS 140 val
77
77
78
78
Proper protection and management of encryption keys is essential for data security. [Azure Key Vault](../key-vault/index.yml) is a cloud service for securely storing and managing secrets. Key Vault enables you to store your encryption keys in hardware security modules (HSMs) that are FIPS 140 validated. For more information, see [Data encryption key management](./azure-secure-isolation-guidance.md#data-encryption-key-management).
79
79
80
-
With Key Vault, you can import or generate encryption keys in HSMs, ensuring that keys never leave the HSM protection boundary to support *bring your own key* (BYOK) scenarios. Keys generated inside the Key Vault HSMs aren't exportable – there can be no clear-text version of the key outside the HSMs. This binding is enforced by the underlying HSM. **Azure Key Vault is designed, deployed, and operated such that Microsoft and its agents don't see or extract your cryptographic keys.** For extra assurances, see [How does Azure Key Vault protect your keys?](../key-vault/managed-hsm/mhsm-control-data.md#how-does-azure-key-vault-managed-hsm-protect-your-keys) Therefore, if you use CMK stored in Azure Key Vault HSMs, you effectively maintain sole ownership of encryption keys.
80
+
With Key Vault, you can import or generate encryption keys in HSMs, ensuring that keys never leave the HSM protection boundary to support *bring your own key* (BYOK) scenarios. Keys generated inside the Key Vault HSMs aren't exportable – there can be no clear-text version of the key outside the HSMs. This binding is enforced by the underlying HSM. **Azure Key Vault is designed, deployed, and operated such that Microsoft and its agents don't see or extract your cryptographic keys.** For more information, see [How does Azure Key Vault protect your keys?](../key-vault/managed-hsm/mhsm-control-data.md#how-does-azure-key-vault-managed-hsm-protect-your-keys) Therefore, if you use CMK stored in Azure Key Vault HSMs, you effectively maintain sole ownership of encryption keys.
81
81
82
82
### Data encryption in transit
83
83
@@ -99,8 +99,6 @@ Technologies like [Intel Software Guard Extensions](https://software.intel.com/s
99
99
100
100
Insider threat is characterized as potential for providing back-door connections and cloud service provider (CSP) privileged administrator access to your systems and data. For more information on how Microsoft restricts insider access to your data, see [Restrictions on insider access](./documentation-government-plan-security.md#restrictions-on-insider-access).
101
101
102
-
All Azure and Azure Government employees in the United States are subject to Microsoft background checks. For more information, see [Screening](./documentation-government-plan-security.md#screening). Azure Government provides you with an extra layer of protection through contractual commitments regarding storage of your data in the United States and limiting potential access to systems processing your data to screened US persons that have completed fingerprint background checks and criminal records checks to address CJIS requirements.
103
-
104
102
## Monitoring your Azure resources
105
103
106
104
Azure provides essential services that you can use to gain in-depth insight into your provisioned Azure resources and get alerted about suspicious activity, including outside attacks aimed at your applications and data. For more information about these services, see [Customer monitoring of Azure resources](./documentation-government-plan-security.md#customer-monitoring-of-azure-resources).
0 commit comments