Skip to content

Commit 5a5e773

Browse files
committed
Updating data encryption docs
1 parent b5a76ef commit 5a5e773

File tree

4 files changed

+6
-2
lines changed

4 files changed

+6
-2
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,8 +77,10 @@ When you're using data encryption by using a customer-managed key, here are reco
7777

7878
* Set a resource lock on Key Vault to control who can delete this critical resource and prevent accidental or unauthorized deletion.
7979
* Enable auditing and reporting on all encryption keys. Key Vault provides logs that are easy to inject into other security information and event management tools. Azure Monitor Log Analytics is one example of a service that's already integrated.
80-
8180
* Ensure that Key Vault and Azure Database for MySQL reside in the same region, to ensure a faster access for DEK wrap, and unwrap operations.
81+
* Lock down the Azure KeyVault to only **private endpoint and selected networks** and allow only *trusted Microsoft* services to secure the resources.
82+
83+
![trusted-service-with-AKV](media/concepts-data-access-and-security-data-encryption/keyvault-trusted-service.png)
8284

8385
Here are recommendations for configuring a customer-managed key:
8486

115 KB
Loading

articles/postgresql/concepts-data-encryption-postgresql.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,10 @@ When you're using data encryption by using a customer-managed key, here are reco
7676

7777
* Set a resource lock on Key Vault to control who can delete this critical resource and prevent accidental or unauthorized deletion.
7878
* Enable auditing and reporting on all encryption keys. Key Vault provides logs that are easy to inject into other security information and event management tools. Azure Monitor Log Analytics is one example of a service that's already integrated.
79-
8079
* Ensure that Key Vault and Azure Database for PostgreSQL Single server reside in the same region, to ensure a faster access for DEK wrap, and unwrap operations.
80+
* Lock down the Azure KeyVault to only **private endpoint and selected networks** and allow only *trusted Microsoft* services to secure the resources.
81+
82+
![trusted-service-with-AKV](media/concepts-data-access-and-security-data-encryption/keyvault-trusted-service.png)
8183

8284
Here are recommendations for configuring a customer-managed key:
8385

115 KB
Loading

0 commit comments

Comments
 (0)