Skip to content

Commit 4dc766d

Browse files
authored
Key rotation clarification
1 parent 22afc98 commit 4dc766d

File tree

1 file changed

+3
-13
lines changed

1 file changed

+3
-13
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -90,9 +90,7 @@ The following rules apply:
9090
- The AEK is used to derive DEKs, which are the keys that are used to
9191
encrypt each block of data written to disk.
9292

93-
- When you configure your key in Key Vault and reference it in the
94-
*Cluster* resource, Azure Storage wraps the AEK with your KEK in
95-
Azure Key Vault.
93+
- When you configure your key in Key Vault and reference it in the *Cluster* resource, the Azure Storage sends requests to your Azure Key Vault to wrap and unwrap the AEK to perform data encryption and decryption operations.
9694

9795
- Your KEK never leaves your Key Vault and in the case of an HSM key,
9896
it never leaves the hardware.
@@ -101,10 +99,6 @@ The following rules apply:
10199
*Cluster* resource to authenticate and access to Azure Key Vault via
102100
Azure Active Directory.
103101

104-
- For read/write operations, Azure Storage sends requests to Azure Key
105-
Vault to wrap and unwrap the AEK to perform encryption
106-
and decryption operations.
107-
108102
## CMK provisioning procedure
109103

110104
For Application Insights CMK configuration, follow the Appendix content for steps 3 and 6.
@@ -403,12 +397,8 @@ encryption key and once accessed, data ingestion and query resume within
403397

404398
## CMK (KEK) rotation
405399

406-
Rotation of CMK requires explicit update of the *Cluster* resource with
407-
the new Azure Key Vault Key version. To update Azure Monitor with your
408-
new key version, follow the instructions in "Update *Cluster* resource
409-
with *Key identifier* details" step.
410-
411-
If you update your key in Key Vault and don't update the new *Key identifier* details in the *Cluster* resource*, Azure Monitor Storage will keep using your previous key.
400+
Rotation of CMK requires explicit update of the *Cluster* resource with the new key version in Azure Key Vault. To update Azure Monitor with your new key version, follow the instructions in "Update *Cluster* resource with Key identifier details" step. If you update your key version in Key Vault and don't update the new Key identifier details in the *Cluster* resource, Azure Monitor Storage will keep using your previous key.
401+
All your data is accessible after the key rotation operation including data ingested before the rotation and after it, since all data remains encrypted by the Account Encryption Key (AEK) while it’s now being encrypted by your new Key Encryption Key (KEK) version.
412402

413403
## Limitations and constraints
414404

0 commit comments

Comments
 (0)