|
| 1 | +--- |
| 2 | +title: Security controls for Azure Key Vault |
| 3 | +description: A checklist of security controls for evaluating Azure Key Vault |
| 4 | +services: key-vault |
| 5 | +author: msmbaldwin |
| 6 | +manager: rkarlin |
| 7 | + |
| 8 | +ms.service: key-vault |
| 9 | +ms.topic: conceptual |
| 10 | +ms.date: 04/16/2019 |
| 11 | +ms.author: mbaldwin |
| 12 | + |
| 13 | +--- |
| 14 | +# Security controls for Azure Key Vault |
| 15 | + |
| 16 | +This article documents the security controls built into Azure Key Vault. |
| 17 | + |
| 18 | +[!INCLUDE [Security controls Header](../../includes/security-controls-header.md)] |
| 19 | + |
| 20 | +## Network |
| 21 | + |
| 22 | +| Security control | Yes/No | Notes | |
| 23 | +|---|---|--| |
| 24 | +| Service endpoint support| Yes | Using Virtual Network (VNet) service endpoints. | |
| 25 | +| VNet injection support| No | | |
| 26 | +| Network isolation and firewalling support| Yes | Using VNet firewall rules. | |
| 27 | +| Forced tunneling support| No | | |
| 28 | + |
| 29 | +## Monitoring & logging |
| 30 | + |
| 31 | +| Security control | Yes/No | Notes| |
| 32 | +|---|---|--| |
| 33 | +| Azure monitoring support (Log analytics, App insights, etc.)| Yes | Using Log Analytics. | |
| 34 | +| Control/Management plane Logging and Audit| Yes | Using Log Analytics. | |
| 35 | +| Data plane logging and audit| Yes | Using Log Analytics. | |
| 36 | + |
| 37 | +## Identity |
| 38 | + |
| 39 | +| Security control | Yes/No | Notes| |
| 40 | +|---|---|--| |
| 41 | +| Authentication| Yes | Authentication is through Azure Active Directory. | |
| 42 | +| Authorization| Yes | Using Key Vault Access Policy. | |
| 43 | + |
| 44 | +## Data protection |
| 45 | + |
| 46 | +| Security control | Yes/No | Notes | |
| 47 | +|---|---|--| |
| 48 | +| Server-side encryption at rest: Microsoft-managed keys | Yes | All objects are encrypted. | |
| 49 | +| Server-side encryption at rest: customer-managed keys (BYOK) | Yes | The customer controls all keys in their Key Vault. When hardware security module (HSM) backed keys are specified, a FIPS Level 2 HSM protects the key, certificate, or secret. | |
| 50 | +| Column level encryption (Azure Data Services)| N/A | | |
| 51 | +| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption)| Yes | All communication is via encrypted API calls | |
| 52 | +| API calls encrypted| Yes | Using HTTPS. | |
| 53 | + |
| 54 | +## Access controls |
| 55 | + |
| 56 | +| Security control | Yes/No | Notes| |
| 57 | +|---|---|--| |
| 58 | +| Control/Management plane access controls | Yes | Azure Resource Manager Role-Based Access Control (RBAC) | |
| 59 | +| Data plane access controls (At every service level) | Yes | Key Vault Access Policy | |
| 60 | + |
| 61 | +## Next steps |
| 62 | + |
| 63 | +- Learn more about the [built-in security controls across Azure services](../security/fundamentals/security-controls.md). |
0 commit comments