Skip to content

Commit 195f8fc

Browse files
authored
Merge pull request #100670 from roygara/cmkPortal
Cmk portal
2 parents 374c7f7 + 8a17f03 commit 195f8fc

13 files changed

+122
-22
lines changed

articles/virtual-machines/linux/disk-encryption.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Server-side encryption of Azure Managed Disks - Azure CLI
33
description: Azure Storage protects your data by encrypting it at rest before persisting it to Storage clusters. You can rely on Microsoft-managed keys for the encryption of your managed disks, or you can use customer-managed keys to manage encryption with your own keys.
44
author: roygara
55

6-
ms.date: 12/13/2019
6+
ms.date: 01/10/2020
77
ms.topic: conceptual
88
ms.author: rogarana
99
ms.service: virtual-machines-linux
@@ -20,15 +20,15 @@ For more information about the cryptographic modules underlying Azure managed di
2020

2121
## About encryption key management
2222

23-
You can rely on platform-managed keys for the encryption of your managed disk, or you can manage encryption using your own keys (public preview). If you choose to manage encryption with your own keys, you can specify a *customer-managed key* to use for encrypting and decrypting all data in managed disks.
23+
You can rely on platform-managed keys for the encryption of your managed disk, or you can manage encryption using your own keys. If you choose to manage encryption with your own keys, you can specify a *customer-managed key* to use for encrypting and decrypting all data in managed disks.
2424

2525
The following sections describe each of the options for key management in greater detail.
2626

2727
## Platform-managed keys
2828

2929
By default, managed disks use platform-managed encryption keys. As of June 10, 2017, all new managed disks, snapshots, images, and new data written to existing managed disks are automatically encrypted-at-rest with platform-managed keys.
3030

31-
## Customer-managed keys (public preview)
31+
## Customer-managed keys
3232

3333
You can choose to manage encryption at the level of each managed disk, with your own keys. Server-side encryption for managed disks with customer-managed keys offers an integrated experience with Azure Key Vault. You can either import [your RSA keys](../../key-vault/key-vault-hsm-protected-keys.md) to your Key Vault or generate new RSA keys in Azure Key Vault. Azure managed disks handles the encryption and decryption in a fully transparent fashion using [envelope encryption](../../storage/common/storage-client-side-encryption.md#encryption-and-decryption-via-the-envelope-technique). It encrypts data using an [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) 256 based data encryption key (DEK), which is, in turn, protected using your keys. You have to grant access to managed disks in your Key Vault to use your keys for encrypting and decrypting the DEK. This allows you full control of your data and keys. You can disable your keys or revoke access to managed disks at any time. You can also audit the encryption key usage with Azure Key Vault monitoring to ensure that only managed disks or other trusted Azure services are accessing your keys.
3434

@@ -52,25 +52,27 @@ To revoke access to customer-managed keys, see [Azure Key Vault PowerShell](http
5252

5353
### Supported scenarios and restrictions
5454

55-
During the preview, only the following scenarios are supported:
55+
For now, only the following scenarios are supported:
5656

5757
- Create a virtual machine (VM) from an Azure Marketplace image and encrypt the OS disk with server-side encryption using customer-managed keys.
5858
- Create a custom image encrypted with server-side encryption and customer-managed keys.
5959
- Create a VM from a custom image and encrypt the OS disk using server-side encryption and customer-managed keys.
6060
- Create data disks encrypted using server-side encryption and customer-managed keys.
61-
- Create snapshots that are encrypted using server-side encryption and customer-managed keys.
61+
- (CLI/PowerShell only) Create snapshots that are encrypted using server-side encryption and customer-managed keys.
6262
- Create virtual machine scale sets that are encrypted with server-side encryption and customer-managed keys.
6363

64-
The preview also has the following restrictions:
64+
For now, we also have the following restrictions:
6565

66-
- **Only available in West Central US, Canada Central, North Europe**.
66+
- **Only available in West Central US, South Central US, East US 2, East US, West US 2, Central Canada, and North Europe.**
6767
- Disks created from custom images that are encrypted using server-side encryption and customer-managed keys must be encrypted using the same customer-managed keys and must be in the same subscription.
6868
- Snapshots created from disks that are encrypted with server-side encryption and customer-managed keys must be encrypted with the same customer-managed keys.
6969
- Custom images encrypted using server-side encryption and customer-managed keys cannot be used in the shared image gallery.
70-
- Your Key Vault must be in the same subscription and region as your customer-managed keys.
70+
- All resources related to your customer-managed keys (Azure Key Vaults, disk encryption sets, VMs, disks, and snapshots) must be in the same subscription and region.
7171
- Disks, snapshots, and images encrypted with customer-managed keys cannot move to another subscription.
72+
- If you use the Azure Portal to create your disk encryption set, you cannot use snapshots for now.
7273

73-
### Setting up your Azure Key Vault and DiskEncryptionSet
74+
### CLI
75+
#### Setting up your Azure Key Vault and DiskEncryptionSet
7476

7577
1. Make sure that you have installed the latest [Azure CLI](/cli/azure/install-az-cli2) and logged to an Azure account in with [az login](/cli/azure/reference-index).
7678

@@ -117,7 +119,7 @@ The preview also has the following restrictions:
117119
az role assignment create --assignee $desIdentity --role Reader --scope $keyVaultId
118120
```
119121
120-
### Create a VM using a Marketplace image, encrypting the OS and data disks with customer-managed keys
122+
#### Create a VM using a Marketplace image, encrypting the OS and data disks with customer-managed keys
121123
122124
```azurecli
123125
rgName=yourResourceGroupName
@@ -134,7 +136,7 @@ az vm create -g $rgName -n $vmName -l $location --image $image --size $vmSize --
134136
135137
```
136138

137-
### Create an empty disk encrypted using server-side encryption with customer-managed keys and attach it to a VM
139+
#### Create an empty disk encrypted using server-side encryption with customer-managed keys and attach it to a VM
138140

139141
```azurecli
140142
vmName=yourVMName
@@ -160,6 +162,11 @@ az vm disk attach --vm-name $vmName --lun $diskLUN --ids $diskId
160162
> [!IMPORTANT]
161163
> Customer-managed keys rely on managed identities for Azure resources, a feature of Azure Active Directory (Azure AD). When you configure customer-managed keys, a managed identity is automatically assigned to your resources under the covers. If you subsequently move the subscription, resource group, or managed disk from one Azure AD directory to another, the managed identity associated with managed disks is not transferred to the new tenant, so customer-managed keys may no longer work. For more information, see [Transferring a subscription between Azure AD directories](../../active-directory/managed-identities-azure-resources/known-issues.md#transferring-a-subscription-between-azure-ad-directories).
162164
165+
[!INCLUDE [virtual-machines-disks-encryption-portal](../../../includes/virtual-machines-disks-encryption-portal.md)]
166+
167+
> [!IMPORTANT]
168+
> Customer-managed keys rely on managed identities for Azure resources, a feature of Azure Active Directory (Azure AD). When you configure customer-managed keys, a managed identity is automatically assigned to your resources under the covers. If you subsequently move the subscription, resource group, or managed disk from one Azure AD directory to another, the managed identity associated with managed disks is not transferred to the new tenant, so customer-managed keys may no longer work. For more information, see [Transferring a subscription between Azure AD directories](../../active-directory/managed-identities-azure-resources/known-issues.md#transferring-a-subscription-between-azure-ad-directories).
169+
163170
## Server-side encryption versus Azure disk encryption
164171

165172
[Azure Disk Encryption for virtual machines and virtual machine scale sets](../../security/fundamentals/azure-disk-encryption-vms-vmss.md) leverages the [BitLocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) feature of Windows and the [DM-Crypt](https://en.wikipedia.org/wiki/Dm-crypt) feature of Linux to encrypt managed disks with customer-managed keys within the guest VM. Server-side encryption with customer-managed keys improves on ADE by enabling you to use any OS types and images for your VMs by encrypting data in the Storage service.

articles/virtual-machines/windows/disk-encryption.md

Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Server-side encryption of Azure Managed Disks - PowerShell
33
description: Azure Storage protects your data by encrypting it at rest before persisting it to Storage clusters. You can rely on Microsoft-managed keys for the encryption of your managed disks, or you can use customer-managed keys to manage encryption with your own keys.
44
author: roygara
55

6-
ms.date: 12/13/2019
6+
ms.date: 01/10/2020
77
ms.topic: conceptual
88
ms.author: rogarana
99
ms.service: virtual-machines-windows
@@ -20,15 +20,15 @@ For more information about the cryptographic modules underlying Azure managed di
2020

2121
## About encryption key management
2222

23-
You can rely on platform-managed keys for the encryption of your managed disk, or you can manage encryption using your own keys (public preview). If you choose to manage encryption with your own keys, you can specify a *customer-managed key* to use for encrypting and decrypting all data in managed disks.
23+
You can rely on platform-managed keys for the encryption of your managed disk, or you can manage encryption using your own keys. If you choose to manage encryption with your own keys, you can specify a *customer-managed key* to use for encrypting and decrypting all data in managed disks.
2424

2525
The following sections describe each of the options for key management in greater detail.
2626

2727
## Platform-managed keys
2828

2929
By default, managed disks use platform-managed encryption keys. As of June 10, 2017, all new managed disks, snapshots, images, and new data written to existing managed disks are automatically encrypted-at-rest with platform-managed keys.
3030

31-
## Customer-managed keys (public preview)
31+
## Customer-managed keys
3232

3333
You can choose to manage encryption at the level of each managed disk, with your own keys. Server-side encryption for managed disks with customer-managed keys offers an integrated experience with Azure Key Vault. You can either import [your RSA keys](../../key-vault/key-vault-hsm-protected-keys.md) to your Key Vault or generate new RSA keys in Azure Key Vault. Azure managed disks handles the encryption and decryption in a fully transparent fashion using [envelope encryption](../../storage/common/storage-client-side-encryption.md#encryption-and-decryption-via-the-envelope-technique). It encrypts data using an [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) 256 based data encryption key (DEK), which is, in turn, protected using your keys. You have to grant access to managed disks in your Key Vault to use your keys for encrypting and decrypting the DEK. This allows you full control of your data and keys. You can disable your keys or revoke access to managed disks at any time. You can also audit the encryption key usage with Azure Key Vault monitoring to ensure that only managed disks or other trusted Azure services are accessing your keys.
3434

@@ -52,25 +52,30 @@ To revoke access to customer-managed keys, see [Azure Key Vault PowerShell](http
5252

5353
### Supported scenarios and restrictions
5454

55-
During the preview, only the following scenarios are supported:
55+
For now, only the following scenarios are supported:
5656

5757
- Create a virtual machine (VM) from an Azure Marketplace image and encrypt the OS disk with server-side encryption using customer-managed keys.
5858
- Create a custom image encrypted with server-side encryption and customer-managed keys.
5959
- Create a VM from a custom image and encrypt the OS disk using server-side encryption and customer-managed keys.
6060
- Create data disks encrypted using server-side encryption and customer-managed keys.
61-
- Create snapshots that are encrypted using server-side encryption and customer-managed keys.
61+
- (CLI/PowerShell only) Create snapshots that are encrypted using server-side encryption and customer-managed keys.
6262
- Create virtual machine scale sets that are encrypted with server-side encryption and customer-managed keys.
63+
- ["Soft" and "Hard" RSA keys](../../key-vault/about-keys-secrets-and-certificates.md#keys-and-key-types) of size 2080 are supported.
6364

64-
The preview also has the following restrictions:
65+
For now, we also have the following restrictions:
6566

66-
- **Only available in West Central US, US East 2, Canada Central, North Europe.**
67+
- **Only available in West Central US, South Central US, East US 2, East US, West US 2, Central Canada, and North Europe.**
6768
- Disks created from custom images that are encrypted using server-side encryption and customer-managed keys must be encrypted using the same customer-managed keys and must be in the same subscription.
6869
- Snapshots created from disks that are encrypted with server-side encryption and customer-managed keys must be encrypted with the same customer-managed keys.
6970
- Custom images encrypted using server-side encryption and customer-managed keys cannot be used in the shared image gallery.
70-
- Your Key Vault must be in the same subscription and region as your customer-managed keys.
71+
- All resources related to your customer-managed keys (Azure Key Vaults, disk encryption sets, VMs, disks, and snapshots) must be in the same subscription and region.
7172
- Disks, snapshots, and images encrypted with customer-managed keys cannot move to another subscription.
73+
- If you use the Azure Portal to create your disk encryption set, you cannot use snapshots for now.
74+
- Only ["soft" and "hard" RSA keys](../../key-vault/about-keys-secrets-and-certificates.md#keys-and-key-types) of size 2080 are supported, no other keys or sizes.
7275

73-
### Setting up your Azure Key Vault and DiskEncryptionSet
76+
### PowerShell
77+
78+
#### Setting up your Azure Key Vault and DiskEncryptionSet
7479

7580
1. Make sure that you have installed latest [Azure PowerShell version](/powershell/azure/install-az-ps), and you are signed in to an Azure account in with Connect-AzAccount
7681

@@ -112,7 +117,7 @@ The preview also has the following restrictions:
112117
New-AzRoleAssignment -ResourceName $keyVaultName -ResourceGroupName $ResourceGroupName -ResourceType "Microsoft.KeyVault/vaults" -ObjectId $des.Identity.PrincipalId -RoleDefinitionName "Reader"
113118
```
114119
115-
### Create a VM using a Marketplace image, encrypting the OS and data disks with customer-managed keys
120+
#### Create a VM using a Marketplace image, encrypting the OS and data disks with customer-managed keys
116121
117122
```powershell
118123
$VMLocalAdminUser = "yourVMLocalAdminUserName"
@@ -150,7 +155,7 @@ $VirtualMachine = Add-AzVMDataDisk -VM $VirtualMachine -Name $($VMName +"DataDis
150155
New-AzVM -ResourceGroupName $ResourceGroupName -Location $LocationName -VM $VirtualMachine -Verbose
151156
```
152157

153-
### Create an empty disk encrypted using server-side encryption with customer-managed keys and attach it to a VM
158+
#### Create an empty disk encrypted using server-side encryption with customer-managed keys and attach it to a VM
154159

155160
```PowerShell
156161
$vmName = "yourVMName"
@@ -173,6 +178,10 @@ Update-AzVM -ResourceGroupName $rgName -VM $vm
173178
174179
```
175180

181+
> [!IMPORTANT]
182+
> Customer-managed keys rely on managed identities for Azure resources, a feature of Azure Active Directory (Azure AD). When you configure customer-managed keys, a managed identity is automatically assigned to your resources under the covers. If you subsequently move the subscription, resource group, or managed disk from one Azure AD directory to another, the managed identity associated with managed disks is not transferred to the new tenant, so customer-managed keys may no longer work. For more information, see [Transferring a subscription between Azure AD directories](../../active-directory/managed-identities-azure-resources/known-issues.md#transferring-a-subscription-between-azure-ad-directories).
183+
184+
[!INCLUDE [virtual-machines-disks-encryption-portal](../../../includes/virtual-machines-disks-encryption-portal.md)]
176185

177186
> [!IMPORTANT]
178187
> Customer-managed keys rely on managed identities for Azure resources, a feature of Azure Active Directory (Azure AD). When you configure customer-managed keys, a managed identity is automatically assigned to your resources under the covers. If you subsequently move the subscription, resource group, or managed disk from one Azure AD directory to another, the managed identity associated with managed disks is not transferred to the new tenant, so customer-managed keys may no longer work. For more information, see [Transferring a subscription between Azure AD directories](../../active-directory/managed-identities-azure-resources/known-issues.md#transferring-a-subscription-between-azure-ad-directories).
13.2 KB
Loading
24.4 KB
Loading
68.4 KB
Loading
83.5 KB
Loading
22.8 KB
Loading
80.8 KB
Loading
27.4 KB
Loading
73.6 KB
Loading

0 commit comments

Comments
 (0)