Skip to content

Commit 6839eef

Browse files
author
James Green
committed
Updates based on Sathya's review
1 parent e7d45e2 commit 6839eef

File tree

2 files changed

+16
-18
lines changed

2 files changed

+16
-18
lines changed

articles/private-5g-core/collect-required-information-for-private-mobile-network.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -42,25 +42,25 @@ As part of creating your private mobile network, you can provision one or more S
4242

4343
If you want to provision SIMs as part of deploying your private mobile network:
4444

45-
1. Choose one of the following encryption types for for the new SIM group to which all of the SIMs you provision will be added:
45+
1. Choose one of the following encryption types for the new SIM group to which all of the SIMs you provision will be added:
4646
Note that once the SIM group is created, the encryption type cannot be changed.
47-
- Microsoft-managed keys (MMK) that automatically renew when needed.
47+
- Microsoft-managed keys (MMK) that Microsoft manages internally for [Encryption at rest](/azure/security/fundamentals/encryption-atrest).
4848
- Customer-managed keys (CMK) that you must manually configure.
4949
You must create a Key URI in your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/) and a [User-assigned identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) with read, wrap, and unwrap access to the key.
50-
- The key must be configured to have an activation and expiration date and we recommend that you enable automatic rotation for the key.
50+
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](https://learn.microsoft.com/azure/key-vault/keys/how-to-configure-key-rotation).
5151
- The SIM group accesses the key via the user-assigned identity.
5252
- For additional information on configuring CMK for a SIM group, see [Configure customer-managed keys](https://docs.microsoft.com/azure/cosmos-db/how-to-setup-cmk).
5353

5454
1. Collect each of the values given in the following table for the SIM group you want to provision.
5555

56-
|Value |Field name in Azure portal | JSON file parameter name |
57-
|---------|---------|---------|
58-
|The name for the SIM group resource. The name must only contain alphanumeric characters, dashes, and underscores. |**SIM group name**|`simGroupName`|
59-
|The region that the SIM group belongs to.|**Region**|`simGroupRegion`|
60-
|The mobile network that the SIM group belongs to.|**Mobile network**|`simGroupMobileNetwork`|
61-
|The chosen encryption type for the SIM group. Microsoft-managed keys (MMK) by default, or customer-managed keys (CMK).|**Encryption Type**|`simGroupEncryption`|
62-
|The Azure Key Vault URI containing the customer-managed Key for the SIM group.|**Key URI**|`simGroupKeyURI`|
63-
|The User-assigned identity for accessing the SIM group's customer-managed Key within the Azure Key Vault.|**User-assigned identity**|`simGroupUserAssignedIdentity`|
56+
|Value |Field name in Azure portal |
57+
|---------|---------|
58+
|The name for the SIM group resource. The name must only contain alphanumeric characters, dashes, and underscores. |**SIM group name**|
59+
|The region that the SIM group belongs to.|**Region**|
60+
|The mobile network that the SIM group belongs to.|**Mobile network**|
61+
|The chosen encryption type for the SIM group. Microsoft-managed keys (MMK) by default, or customer-managed keys (CMK).|**Encryption Type**|
62+
|The Azure Key Vault URI containing the customer-managed Key for the SIM group.|**Key URI**|
63+
|The User-assigned identity for accessing the SIM group's customer-managed Key within the Azure Key Vault.|**User-assigned identity**|
6464

6565
1. Choose one of the following methods for provisioning your SIMs:
6666

articles/private-5g-core/security.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,12 @@ Azure Private 5G Core packet core instances are deployed on Azure Stack Edge dev
3030

3131
## Customer-managed key encryption at rest
3232

33-
In addition to Platform-Managed Keys, you have the option of using Microsoft Managed Keys (MMK) or Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network).
33+
In addition to the default [Encryption at rest](#encryption-at-rest) using Microsoft-Managed Keys (MMK), you can optionally use Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network) to encrypt data with your own key.
3434

35-
If you elect to use a CMK, you will need to:
36-
37-
- [create the CMK](https://learn.microsoft.com/azure/cosmos-db/how-to-setup-customer-managed-keys) with activation and expiration dates and make a note of the key's URI,
38-
- and [create a user-assigned identity](https://learn.microsoft.com/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp) with read, wrap, and unwrap access to the key within your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/).
39-
40-
Additionally, we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](https://learn.microsoft.com/azure/key-vault/keys/how-to-configure-key-rotation).
35+
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/) and a [User-assigned identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) with read, wrap, and unwrap access to the key.
36+
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](https://learn.microsoft.com/azure/key-vault/keys/how-to-configure-key-rotation).
37+
- The SIM group accesses the key via the user-assigned identity.
38+
- For additional information on configuring CMK for a SIM group, see [Configure customer-managed keys](https://docs.microsoft.com/azure/cosmos-db/how-to-setup-cmk).
4139

4240
> [!IMPORTANT]
4341
> Once a SIM group is created, you cannot change the encryption type. However, if the SIM group uses CMK, you can update the key used for encryption.

0 commit comments

Comments
 (0)