Skip to content

Commit 53a25d8

Browse files
authored
Merge pull request #247954 from b-ahibbard/anf-cmk-managed-hsm
Anf cmk managed hsm
2 parents f8048ae + 85f9aaa commit 53a25d8

File tree

6 files changed

+143
-9
lines changed

6 files changed

+143
-9
lines changed

articles/azure-netapp-files/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -313,6 +313,8 @@
313313
href: configure-network-features.md
314314
- name: Configure customer-managed keys
315315
href: configure-customer-managed-keys.md
316+
- name: Configure customer-managed keys with managed HSM
317+
href: configure-customer-managed-keys-hardware.md
316318
- name: Configure Virtual WAN
317319
href: configure-virtual-wan.md
318320
- name: Mount volumes
Lines changed: 127 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,127 @@
1+
---
2+
title: Configure customer-managed keys with managed Hardware Security Module for Azure NetApp Files volume encryption
3+
description: Learn how to encrypt data in Azure NetApp Files with customer-managed keys using the Hardware Security Module
4+
services: azure-netapp-files
5+
documentationcenter: ''
6+
author: b-ahibbard
7+
manager: ''
8+
editor: ''
9+
10+
ms.assetid:
11+
ms.service: azure-netapp-files
12+
ms.workload: storage
13+
ms.tgt_pltfrm: na
14+
ms.topic: how-to
15+
ms.custom: references_regions
16+
ms.date: 08/08/2024
17+
ms.author: anfdocs
18+
---
19+
# Configure customer-managed keys with managed Hardware Security Module for Azure NetApp Files volume encryption
20+
21+
Azure NetApp Files volume encryption with customer-managed keys with the managed Hardware Security Module (HSM) is an extension to [customer-managed keys for Azure NetApp Files volumes encryption feature](configure-customer-managed-keys.md). Customer-managed keys with HSM allows you to store your encryptions keys in a more secure FIPS 140-2 Level 3 HSM instead of the FIPS 140-2 Level 1 or Level 2 service used by Azure Key Vault (AKV).
22+
23+
## Requirements
24+
25+
* Customer-managed keys with managed HSM is supported using the 2022.11 or later API version.
26+
* Customer-managed keys with managed HSM is only supported for Azure NetApp Files accounts that don't have existing encryption.
27+
* Before creating a volume using customer-managed key with managed HSM volume, you must have:
28+
* created an [Azure Key Vault](/azure/key-vault/general/overview), containing at least one key.
29+
* The key vault must have soft delete and purge protection enabled.
30+
* The key must be type RSA.
31+
* created a VNet with a subnet delegated to Microsoft.Netapp/volumes.
32+
* a user- or system-assigned identity for your Azure NetApp Files account.
33+
* [provisioned and activated a managed HSM.](/azure/key-vault/managed-hsm/quick-create-cli)
34+
35+
## Supported regions
36+
37+
* Australia East
38+
* Brazil South
39+
* Canada Central
40+
* Central US
41+
* East Asia
42+
* East US
43+
* East US 2
44+
* France Central
45+
* Japan East
46+
* Korea Central
47+
* North Central US
48+
* North Europe
49+
* Norway East
50+
* Norway West
51+
* South Africa North
52+
* South Central US
53+
* Southeast Asia
54+
* Sweden Central
55+
* Switzerland North
56+
* UAE Central
57+
* UAE North
58+
* UK South
59+
* West US
60+
* West US 2
61+
* West US 3
62+
63+
## Register the feature
64+
65+
This feature is currently in preview. You need to register the feature before using it for the first time. After registration, the feature is enabled and works in the background. No UI control is required.
66+
67+
1. Register the feature:
68+
69+
```azurepowershell-interactive
70+
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFManagedHsmEncryption
71+
```
72+
73+
2. Check the status of the feature registration:
74+
75+
> [!NOTE]
76+
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to`Registered`. Wait until the status is **Registered** before continuing.
77+
78+
```azurepowershell-interactive
79+
Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFManagedHsmEncryption
80+
```
81+
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
82+
83+
## Configure customer-managed keys with managed HSM for system-assigned identity
84+
85+
When you configure customer-managed keys with a system-assigned identity, Azure configures the NetApp account automatically by adding a system-assigned identity. The access policy is created on your Azure Key Vault with key permissions of Get, Encrypt, and Decrypt.
86+
87+
### Requirements
88+
89+
To use a system-assigned identity, the Azure Key Vault must be configured to use Vault access policy as its permission model. Otherwise, you must use a user-assigned identity.
90+
91+
### Steps
92+
93+
1. In the Azure portal, navigate to Azure NetApp Files then select **Encryption**.
94+
1. In the **Encryption** menu, provide the following values:
95+
* For **Encryption key source**, select **Customer Managed Key**.
96+
* For **Key URI**, select **Enter Key URI** then provide the URI for the managed HSM.
97+
* Select the NetApp **Subscription**.
98+
* For **Identity type**, select **System-assigned**.
99+
100+
:::image type="content" source="./media/configure-customer-managed-keys/key-enter-uri.png" alt-text="Screenshot of the encryption menu showing key URI field." lightbox="./media/configure-customer-managed-keys//key-enter-uri.png":::
101+
102+
1. Select **Save**.
103+
104+
## Configure customer-managed keys with managed HSM for user-assigned identity
105+
106+
1. In the Azure portal, navigate to Azure NetApp Files then select **Encryption**.
107+
1. In the **Encryption** menu, provide the following values:
108+
* For **Encryption key source**, select **Customer Managed Key**.
109+
* For **Key URI**, select **Enter Key URI** then provide the URI for the managed HSM.
110+
* Select the NetApp **Subscription**.
111+
* For **Identity type**, select **User-assigned**.
112+
1. When you select **User-assigned**, a context pane opens to select the identity.
113+
* If your Azure Key Vault is configured to use a Vault access policy, Azure configures the NetApp account automatically and adds the user-assigned identity to your NetApp account. The access policy is created on your Azure Key Vault with key permissions of Get, Encrypt, and Decrypt.
114+
* If your Azure Key Vault is configured to use Azure role-based access control (RBAC), ensure the selected user-assigned identity has a role assignment on the key vault with permissions for data actions:
115+
* "Microsoft.KeyVault/vaults/keys/read"
116+
* "Microsoft.KeyVault/vaults/keys/encrypt/action"
117+
* "Microsoft.KeyVault/vaults/keys/decrypt/action"
118+
The user-assigned identity you select is added to your NetApp account. Due to RBAC being customizable, the Azure portal doesn't configure access to the key vault. For more information, see [Using Azure RBAC secret, key, and certificate permissions with Key Vault](/azure/key-vault/general/rbac-guide#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault)
119+
120+
:::image type="content" source="./media/configure-customer-managed-keys/encryption-user-assigned.png" alt-text="Screenshot of user-assigned submenu." lightbox="./media/configure-customer-managed-keys/encryption-user-assigned.png":::
121+
122+
1. Select **Save**.
123+
124+
## Next steps
125+
126+
* [Configure customer-managed keys](configure-customer-managed-keys.md)
127+
* [Security FAQs](faq-security.md)

articles/azure-netapp-files/configure-customer-managed-keys.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ For more information about Azure Key Vault and Azure Private Endpoint, refer to:
122122
:::image type="content" source="./media/configure-customer-managed-keys/key-enter-uri.png" alt-text="Screenshot of the encryption menu showing key URI field." lightbox="./media/configure-customer-managed-keys/key-enter-uri.png":::
123123

124124
1. Select the identity type that you want to use for authentication to the Azure Key Vault. If your Azure Key Vault is configured to use Vault access policy as its permission model, both options are available. Otherwise, only the user-assigned option is available.
125-
* If you choose **System-assigned**, select the **Save** button. The Azure portal configures the NetApp account automatically with the following process: A system-assigned identity is added to your NetApp account. An access policy is to be created on your Azure Key Vault with key permissions Get, Encrypt, Decrypt.
125+
* If you choose **System-assigned**, select the **Save** button. The Azure portal configures the NetApp account automatically by adding a system-assigned identity to your NetApp account. An access policy is also created on your Azure Key Vault with key permissions Get, Encrypt, Decrypt.
126126

127127
:::image type="content" source="./media/configure-customer-managed-keys/encryption-system-assigned.png" alt-text="Screenshot of the encryption menu with system-assigned options." lightbox="./media/configure-customer-managed-keys/encryption-system-assigned.png":::
128128

@@ -492,3 +492,4 @@ This section lists error messages and possible resolutions when Azure NetApp Fil
492492
## Next steps
493493
494494
* [Azure NetApp Files API](https://github.com/Azure/azure-rest-api-specs/tree/master/specification/netapp/resource-manager/Microsoft.NetApp/stable/2019-11-01)
495+
* [Configure customer-managed keys with managed Hardware Security Module](configure-customer-managed-keys-hardware.md)

articles/azure-netapp-files/faq-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: azure-netapp-files
55
ms.topic: conceptual
66
author: b-hchen
77
ms.author: anfdocs
8-
ms.date: 06/15/2024
8+
ms.date: 08/07/2024
99
ms.custom: references_regions
1010
---
1111
# Security FAQs for Azure NetApp Files
@@ -20,7 +20,7 @@ NFSv3 protocol doesn't provide support for encryption, so this data-in-flight ca
2020

2121
## Can the storage be encrypted at rest?
2222

23-
All Azure NetApp Files volumes are encrypted using the FIPS 140-2 standard. Learn [how encryption keys managed](#how-are-encryption-keys-managed).
23+
All Azure NetApp Files volumes are encrypted using the FIPS 140-2 standard. Learn [how encryption keys are managed](#how-are-encryption-keys-managed).
2424

2525
## Is Azure NetApp Files cross-region and cross-zone replication traffic encrypted?
2626

@@ -34,7 +34,7 @@ Alternatively, [customer-managed keys for Azure NetApp Files volume encryption](
3434

3535
Azure NetApp Files supports the ability to move existing volumes using platform-managed keys to customer-managed keys. Once you complete the transition, you cannot revert back to platform-managed keys. For additional information, see [Transition an Azure NetApp Files volume to customer-managed keys](configure-customer-managed-keys.md#transition).
3636

37-
Also, customer-managed keys using Azure Dedicated HSM is supported on a controlled basis. Support is currently available in the East US, South Central US, West US 2, and US Gov Virginia regions. You can request access [with the Azure NetApp Files feedback form](https://aka.ms/ANFFeedback). As capacity becomes available, requests will be approved.
37+
<!-- Also, customer-managed keys using Azure Dedicated HSM is supported on a controlled basis. Support is currently available in the East US, South Central US, West US 2, and US Gov Virginia regions. You can request access [with the Azure NetApp Files feedback form](https://aka.ms/ANFFeedback). As capacity becomes available, requests will be approved. -->
3838

3939
## Can I configure the NFS export policy rules to control access to the Azure NetApp Files service mount target?
4040

articles/azure-netapp-files/whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: b-hchen
66
ms.service: azure-netapp-files
77
ms.custom: linux-related-content
88
ms.topic: overview
9-
ms.date: 07/30/2024
9+
ms.date: 08/07/2024
1010
ms.author: anfdocs
1111
---
1212

@@ -16,6 +16,10 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
1616

1717
## August 2024
1818

19+
* [Volume encryption with customer-managed keys with managed Hardware Security Module (HSM)](configure-customer-managed-keys-hardware.md) (Preview)
20+
21+
Volume encryption with customer-managed keys with managed HSM extends the [customer-managed keys](configure-customer-managed-keys.md), enabling you to store your keys in a more secure FIPS 140-2 Level 3 HSM service instead of the FIPS 140-2 Level 1 or 2 encryption offered with Azure Key Vault.
22+
1923
* [Volume enhancement: Azure NetApp Files now supports 50 GiB minimum volume sizes](azure-netapp-files-resource-limits.md) (preview)
2024

2125
You can now create an Azure NetApp Files volume as small as 50 GiB--a reduction from the initial minimum size of 100 GiB. 50 GiB volumes save costs for workloads that require volumes smaller than 100 GiB, allowing you to appropriately size storage volumes.

articles/security/fundamentals/encryption-models.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -223,12 +223,12 @@ The Azure services that support each encryption model:
223223
| Data Lake Storage Gen2 | Yes | Yes, including Managed HSM | Yes |
224224
| Avere vFXT | Yes | - | - |
225225
| Azure Cache for Redis | Yes | Yes\*\*\*, including Managed HSM | - |
226-
| Azure NetApp Files | Yes | Yes | Yes |
226+
| Azure NetApp Files | Yes | Yes, including Managed HSM | Yes |
227227
| Archive Storage | Yes | Yes | - |
228228
| StorSimple | Yes | Yes | Yes |
229229
| Azure Backup | Yes | Yes, including Managed HSM | Yes |
230230
| Data Box | Yes | - | Yes |
231-
| Data Box Edge | Yes | Yes | - |
231+
| Azure Stack Edge | Yes | Yes | - |
232232
| **Other** | | | |
233233
| Azure Data Manager for Energy | Yes | Yes | Yes |
234234

@@ -240,5 +240,5 @@ The Azure services that support each encryption model:
240240

241241
## Related content
242242

243-
- [encryption is used in Azure](encryption-overview.md)
244-
- [double encryption](double-encryption.md)
243+
- [How encryption is used in Azure](encryption-overview.md)
244+
- [Double encryption](double-encryption.md)

0 commit comments

Comments
 (0)