Skip to content

Commit 41652fa

Browse files
authored
Merge pull request #108194 from VanMSFT/patch-1
Fixes MicrosoftDocs/azure-docs#44211
2 parents a6d131f + 7d97552 commit 41652fa

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

articles/sql-database/transparent-data-encryption-byok-azure-sql.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,13 @@ description: "Bring Your Own Key (BYOK) support for Transparent Data Encryption
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
7-
ms.custom: seo-lt-2019
7+
ms.custom: seo-lt-2019, azure-synapse
88
ms.devlang:
99
ms.topic: conceptual
1010
author: jaszymas
1111
ms.author: jaszymas
1212
ms.reviewer: vanto
13-
ms.date: 02/12/2020
14-
ms.custom: azure-synapse
13+
ms.date: 03/18/2020
1514
---
1615
# Azure SQL Transparent Data Encryption with customer-managed key
1716

@@ -68,7 +67,7 @@ Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging i
6867

6968
- Key vault and SQL Database/managed instance must belong to the same Azure Active Directory tenant. Cross-tenant key vault and server interactions are not supported. To move resources afterwards, TDE with AKV will have to be reconfigured. Learn more about [moving resources](https://docs.microsoft.com/azure/azure-resource-manager/resource-group-move-resources).
7069

71-
- [Soft-delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete) feature must be enabled on the key vault, to protect from data loss accidental key (or key vault) deletion happens. Soft-deleted resources are retained for 90 days, unless recovered or purged by the customer in the meantime. The *recover* and *purge* actions have their own permissions associated in a key vault access policy. Soft-delete feature is off by default and can be enabled via [Powershell](https://docs.microsoft.com/azure/key-vault/key-vault-soft-delete-powershell#enabling-soft-delete) or [CLI](https://docs.microsoft.com/azure/key-vault/key-vault-soft-delete-cli#enabling-soft-delete). It cannot be enabled via Azure portal.
70+
- [Soft-delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete) feature must be enabled on the key vault, to protect from data loss accidental key (or key vault) deletion happens. Soft-deleted resources are retained for 90 days, unless recovered or purged by the customer in the meantime. The *recover* and *purge* actions have their own permissions associated in a key vault access policy. Soft-delete feature is off by default and can be enabled via [PowerShell](https://docs.microsoft.com/azure/key-vault/key-vault-soft-delete-powershell#enabling-soft-delete) or [CLI](https://docs.microsoft.com/azure/key-vault/key-vault-soft-delete-cli#enabling-soft-delete). It cannot be enabled via Azure portal.
7271

7372
- Grant the SQL Database server or managed instance access to the key vault (get, wrapKey, unwrapKey) using its Azure Active Directory identity. When using Azure portal, the Azure AD identity gets automatically created. When using PowerShell or CLI, the Azure AD identity must be explicitly created and completion should be verified. See [Configure TDE with BYOK](transparent-data-encryption-byok-azure-sql-configure.md) and [Configure TDE with BYOK for Managed Instance](https://aka.ms/sqlmibyoktdepowershell) for detailed step-by-step instructions when using PowerShell.
7473

@@ -94,7 +93,7 @@ Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging i
9493

9594
- Enable auditing and reporting on all encryption keys: Key vault provides logs that are easy to inject into other security information and event management tools. Operations Management Suite [Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-azure-key-vault) is one example of a service that is already integrated.
9695

97-
- Link each server with two key vaults that reside in different regions and hold the same key material, to ensure high availability of encrypted databases. Mark only the key from the key vault in the same region as a TDE protector. System will use
96+
- Link each server with two key vaults that reside in different regions and hold the same key material, to ensure high availability of encrypted databases. Mark only the key from the key vault in the same region as a TDE protector. System will automatically switch to the key vault in the remote region if there is an outage affecting the key vault in the same region.
9897

9998
### Recommendations when configuring TDE protector
10099
- Keep a copy of the TDE protector on a secure place or escrow it to the escrow service.

0 commit comments

Comments
 (0)