Skip to content

Commit 852a9c9

Browse files
authored
Merge pull request #123995 from Sayaka-4987/patch-2
Update CMK/MMK for Blocklist in encrypt-data-at-rest.md
2 parents b798bef + 8776dd9 commit 852a9c9

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

articles/ai-services/content-safety/how-to/encrypt-data-at-rest.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,10 @@ Azure AI Content Safety automatically encrypts your data when it's persisted to
2020

2121
Azure AI Content Safety is part of Azure AI services. Azure AI services data is encrypted and decrypted using [FIPS 140-2](https://en.wikipedia.org/wiki/FIPS_140-2) compliant [256-bit AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) encryption. Encryption and decryption are transparent, meaning encryption and access are managed for you. Your data is secure by default and you don't need to modify your code or applications to take advantage of encryption.
2222

23-
2423
## About encryption key management
2524

2625
By default, your subscription uses Microsoft-managed encryption keys. There's also the option to manage your subscription with your own keys called customer-managed keys (CMK). CMK offers greater flexibility to create, rotate, disable, and revoke access controls. You can also audit the encryption keys used to protect your data.
2726

28-
> [!IMPORTANT]
29-
> For blocklist names, only MMK encryption is applied by default. Using CMK or not will not change this behavior. All the other data will use either MMK or CMK depending on what you've selected.
30-
3127
## Customer-managed keys with Azure Key Vault
3228

3329
Customer-managed keys (CMK), also known as Bring your own key (BYOK), offer greater flexibility to create, rotate, disable, and revoke access controls. You can also audit the encryption keys used to protect your data.

0 commit comments

Comments
 (0)