Skip to content

Commit 22d33ab

Browse files
authored
Merge pull request #110089 from msmbaldwin/akv-cas
Restored deleted file
2 parents e196e4d + 87693b9 commit 22d33ab

File tree

3 files changed

+65
-5
lines changed

3 files changed

+65
-5
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32264,11 +32264,6 @@
3226432264
"redirect_url": "/azure/expressroute/expressroute-security-controls",
3226532265
"redirect_document_id": false
3226632266
},
32267-
{
32268-
"source_path": "articles/key-vault/key-vault-security-controls.md",
32269-
"redirect_url": "/azure/key-vault/security-baseline",
32270-
"redirect_document_id": false
32271-
},
3227232267
{
3227332268
"source_path": "articles/key-vault/automation-manage-key-vault.md",
3227432269
"redirect_url": "/azure/key-vault/",
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Security controls for Azure Key Vault
3+
description: A checklist of security controls for evaluating Azure Key Vault
4+
services: key-vault
5+
author: msmbaldwin
6+
manager: rkarlin
7+
8+
ms.service: key-vault
9+
ms.topic: conceptual
10+
ms.date: 04/16/2019
11+
ms.author: mbaldwin
12+
13+
---
14+
# Security controls for Azure Key Vault
15+
16+
This article documents the security controls built into Azure Key Vault.
17+
18+
[!INCLUDE [Security controls Header](../../includes/security-controls-header.md)]
19+
20+
## Network
21+
22+
| Security control | Yes/No | Notes |
23+
|---|---|--|
24+
| Service endpoint support| Yes | Using Virtual Network (VNet) service endpoints. |
25+
| VNet injection support| No | |
26+
| Network isolation and firewalling support| Yes | Using VNet firewall rules. |
27+
| Forced tunneling support| No | |
28+
29+
## Monitoring & logging
30+
31+
| Security control | Yes/No | Notes|
32+
|---|---|--|
33+
| Azure monitoring support (Log analytics, App insights, etc.)| Yes | Using Log Analytics. |
34+
| Control/Management plane Logging and Audit| Yes | Using Log Analytics. |
35+
| Data plane logging and audit| Yes | Using Log Analytics. |
36+
37+
## Identity
38+
39+
| Security control | Yes/No | Notes|
40+
|---|---|--|
41+
| Authentication| Yes | Authentication is through Azure Active Directory. |
42+
| Authorization| Yes | Using Key Vault Access Policy. |
43+
44+
## Data protection
45+
46+
| Security control | Yes/No | Notes |
47+
|---|---|--|
48+
| Server-side encryption at rest: Microsoft-managed keys | Yes | All objects are encrypted. |
49+
| Server-side encryption at rest: customer-managed keys (BYOK) | Yes | The customer controls all keys in their Key Vault. When hardware security module (HSM) backed keys are specified, a FIPS Level 2 HSM protects the key, certificate, or secret. |
50+
| Column level encryption (Azure Data Services)| N/A | |
51+
| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption)| Yes | All communication is via encrypted API calls |
52+
| API calls encrypted| Yes | Using HTTPS. |
53+
54+
## Access controls
55+
56+
| Security control | Yes/No | Notes|
57+
|---|---|--|
58+
| Control/Management plane access controls | Yes | Azure Resource Manager Role-Based Access Control (RBAC) |
59+
| Data plane access controls (At every service level) | Yes | Key Vault Access Policy |
60+
61+
## Next steps
62+
63+
- Learn more about the [built-in security controls across Azure services](../security/fundamentals/security-controls.md).

articles/key-vault/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,8 @@
7575
href: overview-security.md
7676
- name: Security baseline
7777
href: security-baseline.md
78+
- name: Built-In Security
79+
href: key-vault-security-controls.md
7880
- name: Security worlds
7981
href: key-vault-ovw-security-worlds.md
8082
- name: Secure your key vault

0 commit comments

Comments
 (0)