Skip to content

Commit 7778fb0

Browse files
Change SSL to TLS.
1 parent 40e8b80 commit 7778fb0

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

articles/dedicated-hsm/faq.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Microsoft has partnered with Gemalto to deliver the Azure Dedicated HSM service.
3636

3737
### Q: What is an HSM used for?
3838

39-
HSMs are used for storing cryptographic keys that are used for cryptographic functionality such as SSL (secure socket layer), encrypting data, PKI (public key infrastructure), DRM (digital rights management), and signing documents.
39+
HSMs are used for storing cryptographic keys that are used for cryptographic functionality such as Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), encrypting data, PKI (public key infrastructure), DRM (digital rights management), and signing documents.
4040

4141
### Q: How does Dedicated HSM work?
4242

@@ -128,13 +128,13 @@ Yes. Refer to the Gemalto migration guide.
128128

129129
### Q: How do I decide whether to use Azure Key Vault or Azure Dedicated HSM?
130130

131-
Azure Dedicated HSM is the appropriate choice for enterprises migrating to Azure on-premises applications that use HSMs. Dedicated HSMs present an option to migrate an application with minimal changes. If cryptographic operations are performed in the application's code running in an Azure VM or Web App, they can use Dedicated HSM. In general, shrink-wrapped software running in IaaS (infrastructure as a service) models, that support HSMs as a key store can use Dedicate HSM, such as Application gateway or traffic manager for keyless SSL, ADCS (Active Directory Certificate Services), or similar PKI tools, tools/applications used for document signing, code signing, or a SQL Server (IaaS) configured with TDE (transparent database encryption) with master key in an HSM using an EKM (extensible key management) provider. Azure Key Vault is suitable for "born-in-cloud" applications or for encryption at rest scenarios where customer data is processed by PaaS (platform as a service) or SaaS (Software as a service) scenarios such as Office 365 Customer Key, Azure Information Protection, Azure Disk Encryption, Azure Data Lake Store encryption with customer-managed key, Azure Storage encryption with customer managed key, and Azure SQL with customer managed key.
131+
Azure Dedicated HSM is the appropriate choice for enterprises migrating to Azure on-premises applications that use HSMs. Dedicated HSMs present an option to migrate an application with minimal changes. If cryptographic operations are performed in the application's code running in an Azure VM or Web App, they can use Dedicated HSM. In general, shrink-wrapped software running in IaaS (infrastructure as a service) models, that support HSMs as a key store can use Dedicate HSM, such as Application gateway or traffic manager for keyless TLS, ADCS (Active Directory Certificate Services), or similar PKI tools, tools/applications used for document signing, code signing, or a SQL Server (IaaS) configured with TDE (transparent database encryption) with master key in an HSM using an EKM (extensible key management) provider. Azure Key Vault is suitable for "born-in-cloud" applications or for encryption at rest scenarios where customer data is processed by PaaS (platform as a service) or SaaS (Software as a service) scenarios such as Office 365 Customer Key, Azure Information Protection, Azure Disk Encryption, Azure Data Lake Store encryption with customer-managed key, Azure Storage encryption with customer managed key, and Azure SQL with customer managed key.
132132

133133
### Q: What usage scenarios best suit Azure Dedicated HSM?
134134

135135
Azure Dedicated HSM is most suitable for migration scenarios. This means that if you are migrating on-premises applications to Azure that are already using HSMs. This provides a low-friction option to migrate to Azure with minimal changes to the application. If cryptographic operations are performed in the application's code running in Azure VM or Web App, Dedicated HSM may be used. In general, shrink-wrapped software running in IaaS (infrastructure as a service) models, that support HSMs as a key store can use Dedicate HSM, such as:
136136

137-
* Application gateway or traffic manager for keyless SSL
137+
* Application gateway or traffic manager for keyless TLS
138138
* ADCS (Active Directory Certificate Services)
139139
* Similar PKI tools
140140
* Tools/applications used for document signing

articles/key-vault/create-certificate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,8 @@ Certificate creation can be completed manually or using a “Self” issuer. Key
7979

8080
|Provider|Certificate type|
8181
|--------------|----------------------|
82-
|DigiCert|Key Vault offers OV or EV SSL certificates with DigiCert|
83-
|GlobalSign|Key Vault offers OV or EV SSL certificates with GlobalSign|
82+
|DigiCert|Key Vault offers OV or EV TLS/SSL certificates with DigiCert|
83+
|GlobalSign|Key Vault offers OV or EV TLS/SSL certificates with GlobalSign|
8484

8585
A certificate issuer is an entity represented in Azure Key Vault (KV) as a CertificateIssuer resource. It is used to provide information about the source of a KV certificate; issuer name, provider, credentials, and other administrative details.
8686

articles/mariadb/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -506,7 +506,7 @@ Understand customer data protection in Azure: https://docs.microsoft.com/azure/s
506506

507507
### 4.4: Encrypt all sensitive information in transit
508508

509-
**Guidance**: Azure Database for MariaDB supports connecting your Azure Database for MariaDB server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your MariaDB instances.
509+
**Guidance**: Azure Database for MariaDB supports connecting your Azure Database for MariaDB server to client applications using Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL). Enforcing TLS connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your MariaDB instances.
510510

511511
How to configure encryption in transit for MariaDB: https://docs.microsoft.com/azure/mariadb/howto-configure-ssl
512512

articles/postgresql/security-baseline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ Understand service tag usage for Azure Database for PostgreSQL: https://docs.mic
126126

127127
- DDoS Protection Standard should be enabled
128128

129-
- Enforce SSL connection should be enabled for PostgreSQL database servers
129+
- Enforce TLS connection should be enabled for PostgreSQL database servers
130130

131131
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
132132

@@ -521,7 +521,7 @@ Understand customer data protection in Azure: https://docs.microsoft.com/azure/s
521521

522522
### 4.4: Encrypt all sensitive information in transit
523523

524-
**Guidance**: Azure Database for PostgreSQL supports connecting your PostgreSQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your Azure Database for PostgreSQL instances by default.
524+
**Guidance**: Azure Database for PostgreSQL supports connecting your PostgreSQL server to client applications using Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL). Enforcing TLS connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your Azure Database for PostgreSQL instances by default.
525525

526526
Currently the TLS version supported for Azure Database for PostgreSQL are TLS 1.0, TLS 1.1, TLS 1.2.
527527

@@ -790,7 +790,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
790790

791791
**Guidance**: Define and implement standard security configurations for your Azure Database for PostgreSQL instances with Azure Policy. Use Azure Policy aliases in the "Microsoft.DBforPostgreSQL" namespace to create custom policies to audit or enforce the network configuration of your Azure Database for PostgreSQL instances. You may also make use of built-in policy definitions related to your Azure Database for PostgreSQL instances, such as:
792792

793-
- Enforce SSL connection should be enabled for PostgreSQL database servers
793+
- Enforce TLS connection should be enabled for PostgreSQL database servers
794794

795795
- Log connections should be enabled for PostgreSQL database servers
796796

articles/security/benchmarks/security-control-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ https://docs.microsoft.com/azure/firewall/threat-intel
140140
|--|--|--|
141141
| 1.7 | 12.9, 12.10 | Customer |
142142

143-
Deploy Azure Application Gateway for web applications with HTTPS/SSL enabled for trusted certificates.
143+
Deploy Azure Application Gateway for web applications with HTTPS/TLS enabled for trusted certificates.
144144

145145
How to deploy Application Gateway:
146146

0 commit comments

Comments
 (0)