You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/encryption-at-rest-with-cmk-for-backup-vault.md
+16-17Lines changed: 16 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,7 +110,7 @@ To enable the encryption, follow these steps:
110
110
During the vault creation, only *user-assigned managed identities* can be used for CMK. To use CMK with system-assigned managed identity, update the vault properties after creating the vault.
111
111
6. To enable encryption on the backup storage infrastructure, select **Infrastructure Encryption**.
112
112
113
-
You can enable this only on a new vault during the encryption using Customer-Managed Keys (CMK).
113
+
You can enable Infrastructure Encryption only on a new vault during creation and using Customer-Managed Keys (CMK).
114
114
115
115
7. Add tags (optional) and continue creating the vault.
116
116
@@ -256,7 +256,7 @@ To assign a user-assigned managed identity for your Backup vault, follow these s
256
256
> [!NOTE]
257
257
> Key vaults that limit access to specific networks aren't yet supported for use with user-assigned managed identities for CMK encryption.
258
258
259
-
### Assign permissions to the Backup vault to access the encryption key in Azure Key Vault
259
+
### Assign permissions to the Backup vault's Managed Identity(system or user-assigned) to access the encryption key in Azure Key Vault
260
260
261
261
**Choose a client**:
262
262
@@ -409,13 +409,13 @@ To enable soft delete on the vault, run the following commands:
409
409
410
410
### Assign the encryption key to the Backup vault
411
411
412
-
Before you select the encryption key for your vault, ensure that you successfully:
412
+
Before you select the encryption key for your vault, ensure that you have successfully:
413
413
414
414
- Enabled the Backup vault's managed identity and assigned the required permissions to it.
415
415
- Enabled soft delete and purge protection for the key vault.
416
416
417
417
>[!Note]
418
-
>If there're any updates to the current Key Vault details in the **Encryption Settings** with new key vault information, the managed identity used for **Encryption Settings** must retain access to the original Key Vault, with *Get* and *Unwrap* permissions, and the key should be in *Enabled* state. This access is necessary to execute the *key rotation* from the *previous* to the *new* key.
418
+
>If there're any updates to the current Key Vault details in the **Encryption Settings** with new key vault information, the managed identity used for **Encryption Settings** must retain access to the original Key Vault, with *Get* and *Unwrap* permissions, and the key should be in *Enabled* state. This access is necessary to execute the *key rotation* from the *previous*key to the *new* key.
419
419
420
420
To assign the key, follow these steps:
421
421
@@ -427,19 +427,19 @@ To assign the key, follow these steps:
427
427
428
428
:::image type="content" source="./media/encryption-at-rest-with-cmk-for-backup-vault/update-encryption-settings.png" alt-text="Screenshot that shows the link for updating encryption settings." lightbox="./media/encryption-at-rest-with-cmk-for-backup-vault/update-encryption-settings.png":::
429
429
430
-
3. On the **Encryption Settings (Preview)**pane, select **Use your own key** and then specify the key by using one of the following options. Be sure to use an RSA key that's in an enabled and active state.
430
+
3. On the **Encryption Settings**blade, select **Use your own key** and then specify the key by using one of the following options. Be sure to use an RSA key that's in an enabled and active state.
431
431
432
432
- Select **Enter key URI**. In the **Key URI** box, enter the URI for the key that you want to use for encrypting data in this Backup vault. You can also get this key URI from the corresponding key in your key vault.
433
433
434
434
Be sure to copy the key URI correctly. We recommend that you use the **Copy to clipboard** button provided with the key identifier.
435
435
436
436
:::image type="content" source="./media/encryption-at-rest-with-cmk-for-backup-vault/encryption-key-with-full-key-uri.png" alt-text="Screenshot that shows selections for entering a key URI." lightbox="./media/encryption-at-rest-with-cmk-for-backup-vault/encryption-key-with-full-key-uri.png":::
437
437
438
-
When you try to update encryption settings but the update operation fails because of an internal error, the encryption setting is updated to **Inconsistent** and requires your attention.
438
+
When you try to update encryption settings but the update operation fails because of an internal error, the encryption setting is updated to **Inconsistent** and requires your attention. In such cases, check your encryption settings details, ensure that they are correct. For example, the managed identity exists and attached and perform update Encryption Settings operation again. It is fine even if the encryption settings details are same.
439
439
440
440
:::image type="content" source="./media/encryption-at-rest-with-cmk-for-backup-vault/key-uri.png" alt-text="Screenshot that shows the status warning for a failed update." lightbox="./media/encryption-at-rest-with-cmk-for-backup-vault/key-uri.png":::
441
441
442
-
When you're specifying the encryption key by using the full key URI with the version component, the key won't be autorotated. You need to update keys manually by specifying the new key or version when required. Alternatively, remove the version component of the key URI to get automatic rotation.
442
+
When you're specifying the encryption key by using the full key URI with the version component, the key won't be autorotated. You need to update keys manually by specifying the new key or version when required. Alternatively, remove the version component of the key URI to get automatic key version rotation.
443
443
444
444
:::image type="content" source="./media/encryption-at-rest-with-cmk/key-uri.png" alt-text="Screenshot that shows a key URI for a Backup vault." lightbox="./media/encryption-at-rest-with-cmk/key-uri.png":::
445
445
@@ -453,19 +453,15 @@ To assign the key, follow these steps:
453
453
454
454
5. Track the progress and status of the encryption key assignment under **Notifications**.
455
455
456
-
:::image type="content" source="./media/encryption-at-rest-with-cmk/status-succeeded.png" alt-text="Screenshot that shows the status of a backup job as completed." lightbox="./media/encryption-at-rest-with-cmk/status-succeeded.png":::
457
-
458
-
The encryption key updates are also logged in the vault's activity log, under the **Backup Vault update (PATCH)** operation.
459
-
460
-
### Update encryption settings
456
+
### Update encryption settings
461
457
462
458
You can update the encryption settings anytime. Whenever you want to use a new key URI, ensure that your existing key vault still has access to the managed identity and the key is valid. Otherwise, the update operation will fail.
463
459
464
460
The managed identity that you want to use for encryption needs the appropriate permissions.
465
461
466
462
## Back up to a vault encrypted via customer-managed keys
467
463
468
-
Before you configure backup protection, confirm that you successfully:
464
+
Before you configure backup protection, confirm that you have successfully:
469
465
470
466
- Created a Backup vault.
471
467
- Enabled the Backup vault's system-assigned managed identity or assigned a user-assigned managed identity to the vault.
@@ -477,7 +473,7 @@ The process to configure and perform backups to a Backup vault that's encrypted
477
473
478
474
## Private Endpoint support
479
475
480
-
You can use Azure Key Vault with Private Endpoint using System-Assigned Managed Identity of the vault.
476
+
You can use Azure Key Vault with Private Endpoint (PE) using System-Assigned Managed Identity of the vault.
481
477
482
478
If the public network access of the Azure Key Vault is disabled, the access restrictions will prevent you to use Azure portal from outside the private endpoint enabled network machine to Select Key Vault and Key on the **Encryption Settings** blade. However, you can use the **Key Vault key URI** to provide Key Vault key details in **Encryption Settings**.
483
479
@@ -529,13 +525,13 @@ This section lists the various troubleshooting scenarios that you might encounte
529
525
530
526
**Error code**: `CloudServiceRetryableError`
531
527
532
-
**Cause**: If there is an issue with your Backup Vault Encryption Settings (such as you have removed Key Vault/MHSM permissions from the managed identity of the Encryption Settings, disabled system-assigned identity, detached/deleted the managed identity from the Backup vault used for encryption settings, or the key vault/MHSM key is deleted), then vault deletion would fail.
528
+
**Cause**: If there is an issue with your Backup Vault Encryption Settings (such as you have removed Key Vault/MHSM permissions from the managed identity of the Encryption Settings, disabled system-assigned identity, detached/deleted the managed identity from the Backup vault used for encryption settings, or the key vault/MHSM key is deleted), then vault deletion might fail.
533
529
534
530
**Recommended action**: To address this issue:
535
531
536
532
- Ensure that the managed identity being used for Encryption Settings still has the permissions to access the key vault/MHSM. Restore them before you proceed for deletion of the vault.
537
533
-[Reattach/enable the managed identity and assign the required Key Vault/MHSM permissions](#enable-a-managed-identity-for-your-backup-vault).
538
-
- If the key vault key is deleted, then the vault deletion is not currently supported. However, to recover the delete key from the **Soft Deleted** state, ensure that you have the required permissions to the managed identity on the key vault/MHSM, and then retry the **Delete Backup vault** operation.
534
+
- If the key vault key is deleted, then the vault deletion might fail. However, to recover the deleted key from the **Soft Deleted** state, ensure that you have the required permissions to the managed identity on the key vault/MHSM, and then retry the **delete Backup vault** operation.
539
535
540
536
## Validate error codes
541
537
@@ -559,4 +555,7 @@ Azure Backup validates the selected *Azure Key Vault* when CMK is applied on the
559
555
560
556
## Next step
561
557
562
-
[Overview of security features in Azure Backup](security-overview.md).
558
+
-[Overview of security features in Azure Backup](security-overview.md).
559
+
-[Encrypt backup data by using customer-managed keys](encryption-at-rest-with-cmk.md)
0 commit comments