Skip to content

Commit 498785c

Browse files
committed
Updating the existing content for Data encryption
1 parent 5edcd18 commit 498785c

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Database for MySQL Data Encryption with customer-managed key
3-
description: Azure Database for MySQL data encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data.
3+
description: Azure Database for MySQL ata encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data.
44
author: kummanish
55
ms.author: manishku
66
ms.service: mysql
@@ -36,7 +36,7 @@ Data encryption for Azure Database for MySQL provides the following benefits:
3636

3737
**Key Encryption Key (KEK)** - An encryption key used to encrypt the data encryption Keys. Use of a Key Encryption Key that never leaves Key Vault, allows the data encryption keys themselves to be encrypted and controlled. The entity that has access to the KEK may be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.
3838

39-
The Data encryption Key (DEK), encrypted with the Key Encryption Keys, are stored separately and only an entity with access to the Key Encryption Key can decrypt these data encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
39+
The Data encryption Keys (DEK), encrypted with the Key Encryption Keys, are stored separately and only an entity with access to the Key Encryption Key can decrypt these data encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
4040

4141
## How data encryption with customer-managed key works
4242

articles/postgresql/concepts-data-encryption-postgresql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Data encryption for Azure Database for PostgreSQL Single server provides the fol
3636

3737
**Key Encryption Key (KEK)** - An encryption key used to encrypt the data encryption Keys. Use of a Key Encryption Key that never leaves Key Vault, allows the data encryption keys themselves to be encrypted and controlled. The entity that has access to the KEK may be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.
3838

39-
The Data Encryption Key (DEK), encrypted with the Key Encryption Keys, are stored separately and only an entity with access to the Key Encryption Key can decrypt these data encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
39+
The Data Encryption Keys (DEK), encrypted with the Key Encryption Keys, are stored separately and only an entity with access to the Key Encryption Key can decrypt these data encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
4040

4141
## How data encryption with customer-managed key works
4242

0 commit comments

Comments
 (0)