Skip to content

Commit 26153b4

Browse files
author
Abhishek Mallick (IN62059)
committed
Backup data encryption - note updates
1 parent 13daed1 commit 26153b4

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/backup/encryption-at-rest-with-cmk.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Encryption of backup data using customer-managed keys
33
description: Learn how Azure Backup allows you to encrypt your backup data using customer-managed keys (CMK).
44
ms.topic: conceptual
5-
ms.date: 11/24/2022
5+
ms.date: 01/13/2023
66
ms.custom: devx-track-azurepowershell-azurecli, devx-track-azurecli
7-
author: v-amallick
7+
author: jyothisuri
88
ms.service: backup
9-
ms.author: v-amallick
9+
ms.author: jsuri
1010
---
1111

1212
# Encryption of backup data using customer-managed keys
@@ -360,7 +360,7 @@ To assign the key and follow the steps, choose a client:
360360
1. Enter the **Key URI** with which you want to encrypt the data in this Recovery Services vault. You also need to specify the subscription in which the Azure Key Vault (that contains this key) is present. This key URI can be obtained from the corresponding key in your Azure Key Vault. Ensure the key URI is copied correctly. It's recommended that you use the **Copy to clipboard** button provided with the key identifier.
361361
362362
>[!NOTE]
363-
>When specifying the encryption key using the Key URI, the key will not be auto-rotated. So key updates will need to be done manually, by specifying the new key when required.
363+
>When specifying the encryption key using the full Key URI, the key will not be auto-rotated, and you need to perform key updates manually by specifying the new key when required. Alternatively, remove the Version component of the Key URI to get automatic rotation.
364364
365365
![Enter key URI](./media/encryption-at-rest-with-cmk/key-uri.png)
366366
@@ -570,7 +570,7 @@ Using the **Select from Key Vault** option helps to enable auto-rotation for the
570570
Azure Backup allows you to use Azure Polices to audit and enforce encryption, using customer-managed keys, of data in the Recovery Services vault. Using the Azure Policies:
571571

572572
- The audit policy can be used for auditing vaults with encryption using customer-managed keys that are enabled after 04/01/2021. For vaults with the CMK encryption enabled before this date, the policy may fail to apply or may show false negative results (that is, these vaults may be reported as non-compliant, despite having **CMK encryption** enabled).
573-
- To use the audit policy for auditing vaults with **CMK encryption** enabled before 04/01/2021, use the Azure portal to update an encryption key. This helps to upgrade to the new model. If you do not want to change the encryption key, provide the same key again through the key URI or the key selection option.
573+
- To use the audit policy for auditing vaults with **CMK encryption** enabled before 04/01/2021, use the Azure portal to update an encryption key. This helps to upgrade to the new model. If you don't want to change the encryption key, provide the same key again through the key URI or the key selection option.
574574

575575
>[!Warning]
576576
>If you are using PowerShell for managing encryption keys for Backup, we do not recommend to update the keys from the portal.<br>If you update the key from the portal, you can't use PowerShell to update the encryption key further, till a PowerShell update to support the new model is available. However, you can continue updating the key from the Azure portal.
@@ -583,7 +583,7 @@ No, CMK encryption can be enabled for new vaults only. So the vault must never h
583583

584584
### I tried to protect an item to my vault, but it failed, and the vault still doesn't contain any items protected to it. Can I enable CMK encryption for this vault?
585585

586-
No, the vault must have not had any attempts to protect any items to it in the past.
586+
No, the vault must haven't had any attempts to protect any items to it in the past.
587587

588588
### I have a vault that's using CMK encryption. Can I later revert to encryption using platform-managed keys even if I have backup items protected to the vault?
589589

0 commit comments

Comments
 (0)