You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-government/documentation-government-impact-level-5.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ Azure Bot Service can be used in Azure Government supporting Impact Level 5 work
69
69
70
70
Azure Cognitive Search can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
71
71
72
-
- Configure encryption at rest of content in Azure Cognitive Search using customer-managed keys in Azure Key Vault (https://docs.microsoft.com/en-us/azure/search/search-security-manage-encryption-keys)
72
+
- Configure encryption at rest of content in Azure Cognitive Search using customer-managed keys in Azure Key Vault (https://docs.microsoft.com/azure/search/search-security-manage-encryption-keys)
@@ -97,7 +97,7 @@ Text Analytics can be used in Azure Government supporting Impact Level 5 workloa
97
97
98
98
Azure Data Explorer can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
99
99
100
-
- Data in Azure Data Explorer clusters in Azure is secured and encrypted with Microsoft-managed keys by default. For additional control over encryption keys, you can supply customer-managed keys to use for data encryption and manage encryption of your data at the storage level with your own keys.(https://docs.microsoft.com/en-us/azure/data-explorer/security#data-encryption)
100
+
- Data in Azure Data Explorer clusters in Azure is secured and encrypted with Microsoft-managed keys by default. For additional control over encryption keys, you can supply customer-managed keys to use for data encryption and manage encryption of your data at the storage level with your own keys.(https://docs.microsoft.com/azure/data-explorer/security#data-encryption)
@@ -107,7 +107,7 @@ Azure Data Explorer can be used in Azure Government supporting Impact Level 5 wo
107
107
108
108
Azure Data Factory can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
109
109
110
-
Secure data store credentials by storing encrypted credentials in an Azure Data Factory managed store. Data Factory helps protect your data store credentials by encrypting them with certificates managed by Microsoft. For more information about Azure Storage security, see Azure Storage security overview. You can also store the data store's credential in Azure Key Vault. Data Factory retrieves the credential during the execution of an activity. For more information, see Store credential in Azure Key Vault (https://docs.microsoft.com/en-us/azure/data-factory/store-credentials-in-key-vault)
110
+
Secure data store credentials by storing encrypted credentials in an Azure Data Factory managed store. Data Factory helps protect your data store credentials by encrypting them with certificates managed by Microsoft. For more information about Azure Storage security, see Azure Storage security overview. You can also store the data store's credential in Azure Key Vault. Data Factory retrieves the credential during the execution of an activity. For more information, see Store credential in Azure Key Vault (https://docs.microsoft.com/azure/data-factory/store-credentials-in-key-vault)
@@ -259,7 +259,7 @@ Azure Web Apps can be used in Azure Government supporting Impact Level 5 workloa
259
259
260
260
Azure Container Instances can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
261
261
262
-
Azure Container Instances service automatically encrypts data related to your containers when it is persisted in the cloud. Data in ACI is encrypted and decrypted using 256-bit AES encryption and enabled for all ACI deployments. You can rely on Microsoft-managed keys for the encryption of your container data, or you can manage the encryption with your own keys. (https://docs.microsoft.com/en-us/azure/container-instances/container-instances-encrypt-data)
262
+
Azure Container Instances service automatically encrypts data related to your containers when it is persisted in the cloud. Data in ACI is encrypted and decrypted using 256-bit AES encryption and enabled for all ACI deployments. You can rely on Microsoft-managed keys for the encryption of your container data, or you can manage the encryption with your own keys. (https://docs.microsoft.com/azure/container-instances/container-instances-encrypt-data)
@@ -269,7 +269,7 @@ Azure Container Instances service automatically encrypts data related to your co
269
269
270
270
Container Registry can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
271
271
272
-
When you store images and other artifacts in an Azure container registry, Azure automatically encrypts the registry content at rest with service-managed keys. You can supplement default encryption with an additional encryption layer using a key that you create and manage in Azure Key Vault. (https://docs.microsoft.com/en-us/azure/container-registry/container-registry-customer-managed-keys)
272
+
When you store images and other artifacts in an Azure container registry, Azure automatically encrypts the registry content at rest with service-managed keys. You can supplement default encryption with an additional encryption layer using a key that you create and manage in Azure Key Vault. (https://docs.microsoft.com/azure/container-registry/container-registry-customer-managed-keys)
@@ -281,7 +281,7 @@ When you store images and other artifacts in an Azure container registry, Azure
281
281
282
282
Azure Database for MySQL can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
283
283
284
-
Data encryption with customer-managed keys for Azure Database for MySQL enables you to bring your own key (BYOK) for data protection at rest. Data encryption with customer-managed keys for Azure Database for MySQL, is set at the server-level. For a given server, a customer-managed key, called the key encryption key (KEK), is used to encrypt the data encryption key (DEK) used by the service. (https://docs.microsoft.com/en-us/azure/mysql/concepts-data-encryption-mysql)
284
+
Data encryption with customer-managed keys for Azure Database for MySQL enables you to bring your own key (BYOK) for data protection at rest. Data encryption with customer-managed keys for Azure Database for MySQL, is set at the server-level. For a given server, a customer-managed key, called the key encryption key (KEK), is used to encrypt the data encryption key (DEK) used by the service. (https://docs.microsoft.com/azure/mysql/concepts-data-encryption-mysql)
@@ -291,7 +291,7 @@ Data encryption with customer-managed keys for Azure Database for MySQL enables
291
291
292
292
Azure Database for PostgreSQL can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
293
293
294
-
Data encryption with customer-managed keys for Azure Database for PostgreSQL Single server, is set at the server-level. For a given server, a customer-managed key, called the key encryption key (KEK), is used to encrypt the data encryption key (DEK) used by the service. (https://docs.microsoft.com/en-us/azure/postgresql/concepts-data-encryption-postgresql)
294
+
Data encryption with customer-managed keys for Azure Database for PostgreSQL Single server, is set at the server-level. For a given server, a customer-managed key, called the key encryption key (KEK), is used to encrypt the data encryption key (DEK) used by the service. (https://docs.microsoft.com/azure/postgresql/concepts-data-encryption-postgresql)
Azure Stack Edge can be used in Azure Government supporting Impact Level 5 workloads with no additional configuration in the following regions:
315
315
316
-
You can protect data via storage accounts as your device is associated with a storage account that's used as a destination for your data in Azure. Access to the storage account is controlled by the subscription and two 512-bit storage access keys associated with that storage account. (https://docs.microsoft.com/en-us/azure/databox-online/data-box-edge-security#protect-your-data)
316
+
You can protect data via storage accounts as your device is associated with a storage account that's used as a destination for your data in Azure. Access to the storage account is controlled by the subscription and two 512-bit storage access keys associated with that storage account. (https://docs.microsoft.com/azure/databox-online/data-box-edge-security#protect-your-data)
@@ -327,7 +327,7 @@ You can protect data via storage accounts as your device is associated with a st
327
327
328
328
Azure Logic Apps can be used in Azure Government supporting all impact levels with no additional configuration in the following regions:
329
329
330
-
Azure Logic Apps relies on Azure Storage to store and automatically encrypt data at rest. This encryption protects your data and helps you meet your organizational security and compliance commitments. By default, Azure Storage uses Microsoft-managed keys to encrypt your data. For more information about how Azure Storage encryption works, see Azure Storage encryption for data at rest and Azure Data Encryption-at-Rest.(https://docs.microsoft.com/en-us/azure/logic-apps/customer-managed-keys-integration-service-environment)
330
+
Azure Logic Apps relies on Azure Storage to store and automatically encrypt data at rest. This encryption protects your data and helps you meet your organizational security and compliance commitments. By default, Azure Storage uses Microsoft-managed keys to encrypt your data. For more information about how Azure Storage encryption works, see Azure Storage encryption for data at rest and Azure Data Encryption-at-Rest.(https://docs.microsoft.com/azure/logic-apps/customer-managed-keys-integration-service-environment)
@@ -366,7 +366,7 @@ Azure API Management can be used in Azure Government supporting Impact Level 5 w
366
366
367
367
Azure IoT Hub can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
368
368
369
-
IoT Hub supports encryption of data at rest with customer-managed keys (CMK), also known as Bring your own key (BYOK), support for Azure IoT Hub. Azure IoT Hub provides encryption of data at rest and in transit. By default, IoT Hub uses Microsoft-managed keys to encrypt the data. With CMK support, customers now have the choice of encrypting the data at rest with a key encryption key, managed by the customers, using the Azure Key Vault. (https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-customer-managed-keys)
369
+
IoT Hub supports encryption of data at rest with customer-managed keys (CMK), also known as Bring your own key (BYOK), support for Azure IoT Hub. Azure IoT Hub provides encryption of data at rest and in transit. By default, IoT Hub uses Microsoft-managed keys to encrypt the data. With CMK support, customers now have the choice of encrypting the data at rest with a key encryption key, managed by the customers, using the Azure Key Vault. (https://docs.microsoft.com/azure/iot-hub/iot-hub-customer-managed-keys)
@@ -386,7 +386,7 @@ Notification Hubs can be used in Azure Government supporting Impact Level 5 work
386
386
387
387
Automation can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
388
388
389
-
By default, your Azure Automation account uses Microsoft-managed keys.You can manage encryption of secure assets for your Automation account with your own keys. When you specify a customer-managed key at the level of the Automation account, that key is used to protect and control access to the account encryption key for the Automation account. (https://docs.microsoft.com/en-us/azure/automation/automation-secure-asset-encryption)
389
+
By default, your Azure Automation account uses Microsoft-managed keys.You can manage encryption of secure assets for your Automation account with your own keys. When you specify a customer-managed key at the level of the Automation account, that key is used to protect and control access to the account encryption key for the Automation account. (https://docs.microsoft.com/azure/automation/automation-secure-asset-encryption)
@@ -436,7 +436,7 @@ Azure Cost Management can be used in Azure Government supporting Impact Level 5
436
436
437
437
Azure Managed Applications can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
438
438
439
-
Bring your own storage for the managed application definition and store your managed application definition within a storage account provided by you during creation so that it's location and access can be fully managed by you for your regulatory needs. (https://docs.microsoft.com/en-us/azure/azure-resource-manager/managed-applications/publish-service-catalog-app#bring-your-own-storage-for-the-managed-application-definition)
439
+
Bring your own storage for the managed application definition and store your managed application definition within a storage account provided by you during creation so that it's location and access can be fully managed by you for your regulatory needs. (https://docs.microsoft.com/azure/azure-resource-manager/managed-applications/publish-service-catalog-app#bring-your-own-storage-for-the-managed-application-definition)
@@ -462,7 +462,7 @@ Azure Policy can be used in Azure Government supporting Impact Level 5 workloads
462
462
463
463
Microsoft Azure portal can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
464
464
465
-
You can add a markdown tile to your Azure dashboards to display custom, static content. For example, you can show basic instructions, an image, or a set of hyperlinks on a markdown tile (https://docs.microsoft.com/en-us/azure/azure-portal/azure-portal-markdown-tile)
465
+
You can add a markdown tile to your Azure dashboards to display custom, static content. For example, you can show basic instructions, an image, or a set of hyperlinks on a markdown tile (https://docs.microsoft.com/azure/azure-portal/azure-portal-markdown-tile)
@@ -488,7 +488,7 @@ Azure Resource Graph can be used in Azure Government supporting Impact Level 5 w
488
488
489
489
Azure Site Recovery can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
490
490
491
-
You can replicate Azure VMs with Customer-Managed Keys (CMK) enabled managed disks, from one Azure region to another (https://docs.microsoft.com/en-us/azure/site-recovery/azure-to-azure-how-to-enable-replication-cmk-disks)
491
+
You can replicate Azure VMs with Customer-Managed Keys (CMK) enabled managed disks, from one Azure region to another (https://docs.microsoft.com/azure/site-recovery/azure-to-azure-how-to-enable-replication-cmk-disks)
@@ -498,7 +498,7 @@ You can replicate Azure VMs with Customer-Managed Keys (CMK) enabled managed dis
498
498
499
499
Log Analytics can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
500
500
501
-
Configure Customer-Managed Keys (CMK) for your Log Analytics workspaces and Application Insights components. Once configured, any data sent to your workspaces or components is encrypted with your Azure Key Vault key.(https://docs.microsoft.com/en-us/azure/azure-monitor/platform/customer-managed-keys)
501
+
Configure Customer-Managed Keys (CMK) for your Log Analytics workspaces and Application Insights components. Once configured, any data sent to your workspaces or components is encrypted with your Azure Key Vault key.(https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys)
Network Watcher and Network Watcher Traffic Analytics can be used in Azure Government supporting all impact levels with no additional configuration required between regions:
566
566
@@ -733,7 +733,7 @@ For more information on how to enable this Azure Storage Encryption feature, ple
733
733
734
734
StorSimple can be used in Azure Government supporting Impact Level 5 workloads in the following configurations:
735
735
736
-
To help ensure the security and integrity of data moved to the cloud, StorSimple allows you to define cloud storage encryption keys as follows - You specify the cloud storage encryption key when you create a volume container. (https://docs.microsoft.com/en-us/azure/storsimple/storsimple-8000-security#storsimple-data-protection)
736
+
To help ensure the security and integrity of data moved to the cloud, StorSimple allows you to define cloud storage encryption keys as follows - You specify the cloud storage encryption key when you create a volume container. (https://docs.microsoft.com/azure/storsimple/storsimple-8000-security#storsimple-data-protection)
0 commit comments