Skip to content

Commit 5d1cee3

Browse files
Merge pull request #230624 from mattmsft/mattmsft/cmk-scaling
Add note about scaling and CMK
2 parents 3a7cf38 + a2f9945 commit 5d1cee3

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/search/search-security-manage-encryption-keys.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,9 @@ This article walks you through the steps of setting up customer-managed key (CMK
2424

2525
+ CMK encryption becomes operational when an object is created. You can't encrypt objects that already exist. CMK encryption occurs whenever an object is saved to disk, either data at rest for long-term storage or temporary data for short-term storage. With CMK, the disk never sees unencrypted data.
2626

27+
> [!NOTE]
28+
> If an index is CMK encrypted, it is only accessible if the search service has access the key. If access to the key is revoked, the index is unusable and the service cannot be scaled until the index is deleted or access to the key is restored.
29+
2730
## CMK encrypted objects
2831

2932
Objects that can be encrypted include indexes, synonym lists, indexers, data sources, and skillsets. Encryption is computationally expensive to decrypt so only sensitive content is encrypted.

0 commit comments

Comments
 (0)