Skip to content

Commit 97094df

Browse files
authored
Merge pull request #101209 from kummanish/master
Updating the existing content for Data encryption
2 parents 8abc787 + 7871a9c commit 97094df

File tree

4 files changed

+33
-33
lines changed

4 files changed

+33
-33
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
---
22
title: Azure Database for MySQL Data Encryption with customer-managed key
3-
description: Azure Database for MySQL Data Encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data.
3+
description: Azure Database for MySQL data encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data.
44
author: kummanish
55
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
88
ms.date: 01/13/2020
99
---
1010

11-
# Azure Database for MySQL Data Encryption with customer-managed key
11+
# Azure Database for MySQL data encryption with customer-managed key
1212

1313
> [!NOTE]
1414
> At this time, you must request access to use this capability. To do so, please contact [email protected].
1515
16-
Azure Database for MySQL Data Encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed encryption, you are responsible for and in a full control of a key's lifecycle (key creation, upload, rotation, deletion), key usage permissions, and auditing of operations on keys.
16+
Azure Database for MySQL data encryption with customer-managed key enables you to Bring Your Own Key (BYOK) for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed encryption, you are responsible for and in a full control of a key's lifecycle (key creation, upload, rotation, deletion), key usage permissions, and auditing of operations on keys.
1717

18-
For Azure Database for MySQL, the Data Encryption is set at the server-level. With this form of data encryption, the key is used to in the encryption of the Database Encryption Key (DEK), which is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](../key-vault/key-Vault-secure-your-key-Vault.md), a cloud-based external key management system. AKV is highly available and provides scalable secure storage for RSA cryptographic keys, optionally backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the Key Vault, imported, or [transferred to the Key Vault from an on-prem HSM device](../key-vault/key-Vault-hsm-protected-keys.md).
18+
For Azure Database for MySQL, the data encryption is set at the server-level. With this form of data encryption, the key is used to in the encryption of the Database Encryption Key (DEK), which is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](../key-vault/key-Vault-secure-your-key-Vault.md), a cloud-based external key management system. AKV is highly available and provides scalable secure storage for RSA cryptographic keys, optionally backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the Key Vault, imported, or [transferred to the Key Vault from an on-prem HSM device](../key-vault/key-Vault-hsm-protected-keys.md).
1919

2020
> [!NOTE]
2121
> This feature is available in all Azure regions where Azure Database for MySQL supports General Purpose and Memory Optimized pricing tiers.
2222
2323
## Benefits
2424

25-
Data Encryption for Azure Database for MySQL provides the following benefits:
25+
Data encryption for Azure Database for MySQL provides the following benefits:
2626

2727
* Increased transparency, granular control, and management for the encryption key.
2828
* Central management and organization of keys by hosting them in Azure Key Vault.
@@ -32,33 +32,33 @@ Data Encryption for Azure Database for MySQL provides the following benefits:
3232

3333
## Terminology and description
3434

35-
**Data Encryption Key (DEK)** – A symmetric AES256 key used to encrypt a partition or block of data. Encrypting each block of data with a different key makes crypto analysis attacks more difficult. Access to DEKs is needed by the resource provider or application instance that is encrypting and decrypting a specific block. When a DEK is replaced with a new key, only the data in its associated block must be re-encrypted with the new key.
35+
**Data encryption Key (DEK)** – A symmetric AES256 key used to encrypt a partition or block of data. Encrypting each block of data with a different key makes crypto analysis attacks more difficult. Access to DEKs is needed by the resource provider or application instance that is encrypting and decrypting a specific block. When a DEK is replaced with a new key, only the data in its associated block must be re-encrypted with the new key.
3636

37-
**Key Encryption Key (KEK)** - An encryption key used to encrypt the Data Encryption Keys. Use of a Key Encryption Key that never leaves Key Vault, allows the data encryption keys themselves to be encrypted and controlled. The entity that has access to the KEK may be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.
37+
**Key Encryption Key (KEK)** - An encryption key used to encrypt the data encryption Keys. Use of a Key Encryption Key that never leaves Key Vault, allows the data encryption keys themselves to be encrypted and controlled. The entity that has access to the KEK may be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.
3838

39-
The Data Encryption Keys, encrypted with the Key Encryption Keys are stored separately and only an entity with access to the Key Encryption Key can decrypt these Data Encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
39+
The Data encryption Keys (DEK), encrypted with the Key Encryption Keys, are stored separately and only an entity with access to the Key Encryption Key can decrypt these data encryption Keys. For more information, see [security in encryption at rest](../security/fundamentals/encryption-atrest.md).
4040

41-
## How Data Encryption with customer-managed key works
41+
## How data encryption with customer-managed key works
4242

4343
![Bring your own key overview](media/concepts-data-access-and-security-data-encryption/mysqloverview.png)
4444

4545
For a MySQL server to be able to use customer-managed keys stored in AKV for encryption of the DEK, a Key Vault administrator needs to give the following access rights to the server using its unique identity:
4646

4747
* **get** - for retrieving the public part and properties of the key in the Key Vault
48-
* **wrapKey** - to be able to protect (encrypt) DEK
49-
* **unwrapKey** - to be able to unprotect (decrypt) DEK
48+
* **wrapKey** - to be able to encrypt DEK
49+
* **unwrapKey** - to be able to decrypt DEK
5050

5151
Key Vault administrator can also [enable logging of Key Vault audit events](../azure-monitor/insights/azure-key-vault.md), so they can be audited later.
5252

5353
When the server is configured to use the customer-managed key that is stored in the Key Vault, the server sends the DEK to the Key Vault for encryptions. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, server sends protected DEK to the Key Vault for decryption. Auditors can use Azure Monitor to review Key Vault AuditEvent logs, if logging is enabled.
5454

55-
## Requirements for configuring Data Encryption for Azure Database for MySQL
55+
## Requirements for configuring data encryption for Azure Database for MySQL
5656

5757
### Requirements for configuring AKV
5858

5959
* Key Vault and Azure Database for MySQL must belong to the same Azure Active Directory (AAD) tenant. Cross-tenant Key Vault and server interactions are not supported. Moving resources afterwards requires you to reconfigure the data encryption. Learn more about moving resources.
6060
* Soft-delete feature must be enabled on the Key Vault, to protect from data loss accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless recovered or purged by the customer in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. Soft-delete feature is off by default and can be enabled via Powershell or CLI. It cannot be enabled via Azure portal.
61-
* Grant the Azure Database for MySQL access to the Key Vault with the **get, wrapKey, unwrapKey** permissions using its unique managed identity. When using Azure portal, the unique identify gets automatically created when data encryption is enabled on the MySQL. See [Configure Data Encryption for MySQL](howto-data-encryption-portal.md) for detailed step-by-step instructions when using Azure portal.
61+
* Grant the Azure Database for MySQL access to the Key Vault with the **get, wrapKey, unwrapKey** permissions using its unique managed identity. When using Azure portal, the unique identify gets automatically created when data encryption is enabled on the MySQL. See [Configure data encryption for MySQL](howto-data-encryption-portal.md) for detailed step-by-step instructions when using Azure portal.
6262

6363
* When using firewall with AKV, you must enable option *Allow trusted Microsoft services to bypass the firewall*.
6464

@@ -69,7 +69,7 @@ When the server is configured to use the customer-managed key that is stored in
6969
* The key must be in the *Enabled* state.
7070
* If you are importing existing key into the Key Vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
7171

72-
## Recommendations when using Data Encryption using customer-managed key
72+
## Recommendations when using data encryption using customer-managed key
7373

7474
### Recommendation for configuring AKV
7575

articles/mysql/howto-data-encryption-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 01/13/2020
1010

1111
# Data Encryption for Azure Database for MySQL server using Azure portal
1212

13-
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for MySQL.
13+
In this article, you will learn how to set up and manage to use the Azure portal to set up data encryption for your Azure Database for MySQL.
1414

1515
## Prerequisites for CLI
1616

@@ -46,7 +46,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
4646
4747
3. **Save** the settings.
4848
49-
## Setting Data Encryption for Azure Database for MySQL
49+
## Setting data encryption for Azure Database for MySQL
5050
5151
1. On the **Azure Database for MySQL**, select the **Data Encryption** to set the customer-managed key setup.
5252
@@ -60,7 +60,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
6060
6161
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6262
63-
## Restoring or creating replica of the server, which has Data Encryption enabled
63+
## Restoring or creating replica of the server, which has data encryption enabled
6464
6565
Once an Azure Database for MySQL is encrypted with customer's managed key stored in the Key Vault, any newly created copy of the server either though local or geo-restore operation or a replica (local/cross-region) operation. So for an encrypted MySQL server, you can follow the steps below to create an encrypted restored server.
6666
@@ -91,4 +91,4 @@ Once an Azure Database for MySQL is encrypted with customer's managed key stored
9191
9292
## Next steps
9393
94-
To learn more about Data Encryption, see [what is Azure data encryption](concepts-data-encryption-mysql.md).
94+
To learn more about data encryption, see [what is Azure data encryption](concepts-data-encryption-mysql.md).

0 commit comments

Comments
 (0)