You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/mysql/concepts-data-encryption-mysql.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,28 +1,28 @@
1
1
---
2
2
title: Azure Database for MySQL Data Encryption with customer-managed key
3
-
description: Azure Database for MySQL Data Encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data.
3
+
description: Azure Database for MySQL data encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data.
4
4
author: kummanish
5
5
ms.author: manishku
6
6
ms.service: mysql
7
7
ms.topic: conceptual
8
8
ms.date: 01/13/2020
9
9
---
10
10
11
-
# Azure Database for MySQL Data Encryption with customer-managed key
11
+
# Azure Database for MySQL data encryption with customer-managed key
12
12
13
13
> [!NOTE]
14
14
> At this time, you must request access to use this capability. To do so, please contact [email protected].
15
15
16
-
Azure Database for MySQL Data Encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed encryption, you are responsible for and in a full control of a key's lifecycle (key creation, upload, rotation, deletion), key usage permissions, and auditing of operations on keys.
16
+
Azure Database for MySQL data encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed encryption, you are responsible for and in a full control of a key's lifecycle (key creation, upload, rotation, deletion), key usage permissions, and auditing of operations on keys.
17
17
18
-
For Azure Database for MySQL, the Data Encryption is set at the server-level. With this form of data encryption, the key is used to in the encryption of the Database Encryption Key (DEK), which is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](../key-vault/key-Vault-secure-your-key-Vault.md), a cloud-based external key management system. AKV is highly available and provides scalable secure storage for RSA cryptographic keys, optionally backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the Key Vault, imported, or [transferred to the Key Vault from an on-prem HSM device](../key-vault/key-Vault-hsm-protected-keys.md).
18
+
For Azure Database for MySQL, the data encryption is set at the server-level. With this form of data encryption, the key is used to in the encryption of the Database Encryption Key (DEK), which is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](../key-vault/key-Vault-secure-your-key-Vault.md), a cloud-based external key management system. AKV is highly available and provides scalable secure storage for RSA cryptographic keys, optionally backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the Key Vault, imported, or [transferred to the Key Vault from an on-prem HSM device](../key-vault/key-Vault-hsm-protected-keys.md).
19
19
20
20
> [!NOTE]
21
21
> This feature is available in all Azure regions where Azure Database for MySQL supports General Purpose and Memory Optimized pricing tiers.
22
22
23
23
## Benefits
24
24
25
-
Data Encryption for Azure Database for MySQL provides the following benefits:
25
+
Data encryption for Azure Database for MySQL provides the following benefits:
26
26
27
27
* Increased transparency, granular control, and management for the encryption key.
28
28
* Central management and organization of keys by hosting them in Azure Key Vault.
@@ -32,33 +32,33 @@ Data Encryption for Azure Database for MySQL provides the following benefits:
32
32
33
33
## Terminology and description
34
34
35
-
**Data Encryption Key (DEK)** – A symmetric AES256 key used to encrypt a partition or block of data. Encrypting each block of data with a different key makes crypto analysis attacks more difficult. Access to DEKs is needed by the resource provider or application instance that is encrypting and decrypting a specific block. When a DEK is replaced with a new key, only the data in its associated block must be re-encrypted with the new key.
35
+
**Data encryption Key (DEK)** – A symmetric AES256 key used to encrypt a partition or block of data. Encrypting each block of data with a different key makes crypto analysis attacks more difficult. Access to DEKs is needed by the resource provider or application instance that is encrypting and decrypting a specific block. When a DEK is replaced with a new key, only the data in its associated block must be re-encrypted with the new key.
36
36
37
-
**Key Encryption Key (KEK)** - An encryption key used to encrypt the Data Encryption Keys. Use of a Key Encryption Key that never leaves Key Vault, allows the data encryption keys themselves to be encrypted and controlled. The entity that has access to the KEK may be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.
37
+
**Key Encryption Key (KEK)** - An encryption key used to encrypt the data encryption Keys. Use of a Key Encryption Key that never leaves Key Vault, allows the data encryption keys themselves to be encrypted and controlled. The entity that has access to the KEK may be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.
38
38
39
-
The Data Encryption Keys, encrypted with the Key Encryption Keys are stored separately and only an entity with access to the Key Encryption Key can decrypt these Data Encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
39
+
The Data encryption Keys (DEK), encrypted with the Key Encryption Keys, are stored separately and only an entity with access to the Key Encryption Key can decrypt these data encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
40
40
41
-
## How Data Encryption with customer-managed key works
41
+
## How data encryption with customer-managed key works
42
42
43
43

44
44
45
45
For a MySQL server to be able to use customer-managed keys stored in AKV for encryption of the DEK, a Key Vault administrator needs to give the following access rights to the server using its unique identity:
46
46
47
47
***get** - for retrieving the public part and properties of the key in the Key Vault
48
-
***wrapKey** - to be able to protect (encrypt) DEK
49
-
***unwrapKey** - to be able to unprotect (decrypt) DEK
48
+
***wrapKey** - to be able to encrypt DEK
49
+
***unwrapKey** - to be able to decrypt DEK
50
50
51
51
Key Vault administrator can also [enable logging of Key Vault audit events](../azure-monitor/insights/azure-key-vault.md), so they can be audited later.
52
52
53
53
When the server is configured to use the customer-managed key that is stored in the Key Vault, the server sends the DEK to the Key Vault for encryptions. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, server sends protected DEK to the Key Vault for decryption. Auditors can use Azure Monitor to review Key Vault AuditEvent logs, if logging is enabled.
54
54
55
-
## Requirements for configuring Data Encryption for Azure Database for MySQL
55
+
## Requirements for configuring data encryption for Azure Database for MySQL
56
56
57
57
### Requirements for configuring AKV
58
58
59
59
* Key Vault and Azure Database for MySQL must belong to the same Azure Active Directory (AAD) tenant. Cross-tenant Key Vault and server interactions are not supported. Moving resources afterwards requires you to reconfigure the data encryption. Learn more about moving resources.
60
60
* Soft-delete feature must be enabled on the Key Vault, to protect from data loss accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless recovered or purged by the customer in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. Soft-delete feature is off by default and can be enabled via Powershell or CLI. It cannot be enabled via Azure portal.
61
-
* Grant the Azure Database for MySQL access to the Key Vault with the **get, wrapKey, unwrapKey** permissions using its unique managed identity. When using Azure portal, the unique identify gets automatically created when data encryption is enabled on the MySQL. See [Configure Data Encryption for MySQL](howto-data-encryption-portal.md) for detailed step-by-step instructions when using Azure portal.
61
+
* Grant the Azure Database for MySQL access to the Key Vault with the **get, wrapKey, unwrapKey** permissions using its unique managed identity. When using Azure portal, the unique identify gets automatically created when data encryption is enabled on the MySQL. See [Configure data encryption for MySQL](howto-data-encryption-portal.md) for detailed step-by-step instructions when using Azure portal.
62
62
63
63
* When using firewall with AKV, you must enable option *Allow trusted Microsoft services to bypass the firewall*.
64
64
@@ -69,7 +69,7 @@ When the server is configured to use the customer-managed key that is stored in
69
69
* The key must be in the *Enabled* state.
70
70
* If you are importing existing key into the Key Vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
71
71
72
-
## Recommendations when using Data Encryption using customer-managed key
72
+
## Recommendations when using data encryption using customer-managed key
Copy file name to clipboardExpand all lines: articles/mysql/howto-data-encryption-portal.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 01/13/2020
10
10
11
11
# Data Encryption for Azure Database for MySQL server using Azure portal
12
12
13
-
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for MySQL.
13
+
In this article, you will learn how to set up and manage to use the Azure portal to set up data encryption for your Azure Database for MySQL.
14
14
15
15
## Prerequisites for CLI
16
16
@@ -46,7 +46,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
46
46
47
47
3. **Save** the settings.
48
48
49
-
## Setting Data Encryption for Azure Database for MySQL
49
+
## Setting data encryption for Azure Database for MySQL
50
50
51
51
1. On the **Azure Database for MySQL**, select the **Data Encryption** to set the customer-managed key setup.
52
52
@@ -60,7 +60,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
60
60
61
61
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
62
62
63
-
## Restoring or creating replica of the server, which has Data Encryption enabled
63
+
## Restoring or creating replica of the server, which has data encryption enabled
64
64
65
65
Once an Azure Database for MySQL is encrypted with customer's managed key stored in the Key Vault, any newly created copy of the server either though local or geo-restore operation or a replica (local/cross-region) operation. So for an encrypted MySQL server, you can follow the steps below to create an encrypted restored server.
66
66
@@ -91,4 +91,4 @@ Once an Azure Database for MySQL is encrypted with customer's managed key stored
91
91
92
92
## Next steps
93
93
94
-
To learn more about Data Encryption, see [what is Azure data encryption](concepts-data-encryption-mysql.md).
94
+
To learn more about data encryption, see [what is Azure data encryption](concepts-data-encryption-mysql.md).
0 commit comments