Skip to content

Commit 31c3fa2

Browse files
committed
added:
note HSM is suppported HSM mentions and related info for use
1 parent 5047a0c commit 31c3fa2

File tree

1 file changed

+17
-5
lines changed

1 file changed

+17
-5
lines changed

articles/mysql/flexible-server/concepts-customer-managed-key.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,16 @@ ms.topic: conceptual
1616

1717
With data encryption with customer-managed keys for Azure Database for MySQL flexible server, you can bring your own key (BYOK) for data protection at rest and implement separation of duties for managing keys and data. With customer managed keys (CMKs), the customer is responsible for and ultimately controls the key lifecycle management (key creation, upload, rotation, deletion), key usage permissions, and auditing operations on keys.
1818

19+
[!NOTE]
20+
Azure Key Vault Managed HSM (Hardware Security Module) is currently supported for customer-managed keys for Azure Database for MySQL Flexible Server.
21+
1922
## Benefits
2023

2124
Data encryption with customer-managed keys for Azure Database for MySQL flexible server provides the following benefits:
2225

2326
- You fully control data access by the ability to remove the key and make the database inaccessible
2427
- Full control over the key lifecycle, including rotation of the key to aligning with corporate policies
25-
- Central management and organization of keys in Azure Key Vault
28+
- Central management and organization of keys in Azure Key Vault or Managed HSM
2629
- Ability to implement separation of duties between security officers, DBA, and system administrators
2730

2831
## How does data encryption with a customer-managed key work?
@@ -38,6 +41,15 @@ The UMI must have the following access to the key vault:
3841
- **Wrap Key**: To be able to encrypt the DEK. The encrypted DEK is stored in the Azure Database for MySQL flexible server instance.
3942
- **Unwrap Key**: To be able to decrypt the DEK. Azure Database for MySQL flexible server needs the decrypted DEK to encrypt/decrypt the data.
4043

44+
If RBAC is enabled, the UMI must also be assigned the following role:
45+
46+
- **Key Vault Crypto Service Encryption User** or the role with the permissions:
47+
- Microsoft.KeyVault/vaults/keys/wrap/action
48+
- Microsoft.KeyVault/vaults/keys/unwrap/action
49+
- Microsoft.KeyVault/vaults/keys/read like "Key Vault Crypto Service Encryption User"
50+
- For Managed HSM, assign the **Managed HSM Crypto Service Encryption User** role
51+
52+
4153
### Terminology and description
4254

4355
**Data encryption key (DEK)**: A symmetric AES256 key used to encrypt a partition or block of data. Encrypting each block of data with a different key makes crypto analysis attacks more difficult. Access to DEKs is needed by the resource provider or application instance that encrypts and decrypts a specific block. When you replace a DEK with a new key, only the data in its associated block must be re-encrypted with the new key.
@@ -59,7 +71,7 @@ After logging is enabled, auditors can use Azure Monitor to review Key Vault aud
5971
6072
## Requirements for configuring data encryption for Azure Database for MySQL flexible server
6173

62-
Before you attempt to configure Key Vault, be sure to address the following requirements.
74+
Before you attempt to configure Key Vault or Managed HSM, be sure to address the following requirements.
6375

6476
- The Key Vault and Azure Database for MySQL flexible server instance must belong to the same Microsoft Entra tenant. Cross-tenant Key Vault and flexible server interactions need to be supported. You'll need to reconfigure data encryption if you move Key Vault resources after performing the configuration.
6577
- The Key Vault and Azure Database for MySQL flexible server instance must reside in the same region.
@@ -80,16 +92,16 @@ Before you attempt to configure the CMK, be sure to address the following requir
8092
8193
## Recommendations for configuring data encryption
8294

83-
As you configure Key Vault to use data encryption using a customer-managed key, keep in mind the following recommendations.
95+
As you configure Key Vault or Managed HSM to use data encryption using a customer-managed key, keep in mind the following recommendations.
8496

8597
- Set a resource lock on Key Vault to control who can delete this critical resource and prevent accidental or unauthorized deletion.
8698
- Enable auditing and reporting on all encryption keys. Key Vault provides logs that are easy to inject into other security information and event management tools. Azure Monitor Log Analytics is one example of a service that's already integrated.
8799
- Keep a copy of the customer-managed key in a secure place or escrow it to the escrow service.
88100
- If Key Vault generates the key, create a key backup before using the key for the first time. You can only restore the backup to Key Vault. For more information about the backup command, see [Backup-AzKeyVaultKey](/powershell/module/az.keyVault/backup-azkeyVaultkey).
89101

90102
> [!NOTE]
91-
> * It is advised to use a key vault from the same region, but if necessary, you can use a key vault from another region by specifying the "enter key identifier" information.
92-
> * RSA key stored in **Azure Key Vault Managed HSM**, is currently not supported.
103+
> * It is advised to use a key vault from the same region, but if necessary, you can use a key vault from another region by specifying the "enter key identifier" information. The key vault managed HSM must be in the same region as the MySQL flexible server.
104+
93105

94106
## Inaccessible customer-managed key condition
95107

0 commit comments

Comments
 (0)