Skip to content

Commit 9a1bece

Browse files
committed
updates
1 parent 6f5daa8 commit 9a1bece

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/devtest-labs/encrypt-disks-customer-managed-keys.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -12,26 +12,26 @@ ms.custom: subject-rbac-steps, UpdateFrequency2
1212

1313
# Encrypt disks with customer-managed keys in Azure DevTest Labs
1414

15-
Server-side encryption (SSE) protects your data and helps you meet your organizational security and compliance commitments. SSE automatically encrypts data stored on managed disks in Azure (OS and data disks) at rest by default when it's persisted to the cloud. For more information about disk encryption on Azure, see [disk encryption](/azure/virtual-machines/disk-encryption).
15+
Server-side encryption (SSE) protects your data and helps you meet your organizational security and compliance commitments. SSE automatically encrypts data stored on managed disks in Azure (OS and data disks) at rest by default when it's persisted to the cloud. For more information about disk encryption on Azure, see [disk encryption](/azure/virtual-machines/disk-encryption).
1616

1717
In Azure DevTest Labs, all OS disks and data disks created in a lab are encrypted via platform-managed keys. However, as a lab owner, you can choose to manage the encryption of lab virtual machine disks by using your own keys. If you choose to manage encryption by using your own keys, you can specify a *customer-managed key* to use for encrypting data in lab disks. To learn more about SSE with customer-managed keys, and other managed disk encryption types, see [Customer-managed keys](/azure/virtual-machines/disk-encryption#customer-managed-keys). Also, see [restrictions with using customer-managed keys](/azure/virtual-machines/disks-enable-customer-managed-keys-portal#restrictions).
1818

1919
> [!NOTE]
20-
> The disk encryption setting applies to newly created disks in the lab. If you change the disk encryption set at some point, older disks in the lab will continue to be encrypted with the previous disk encryption set.
20+
> The disk encryption setting applies to newly created disks in the lab. If you change the disk encryption set at some point, older disks in the lab continue to be encrypted with the previous disk encryption set.
2121
2222
The following section shows how a lab owner can set up encryption with a customer-managed key.
2323

2424
## Prerequisites
2525

26-
- If you don't have a disk encryption set, [complete the steps in this article to set up a key vault and a disk encryption set](/azure/virtual-machines/disks-enable-customer-managed-keys-portal). Note the following requirements for the disk encryption set:
26+
- If you don't have a disk encryption set, [complete the steps in this article to set up a key vault and a disk encryption set](/azure/virtual-machines/disks-enable-customer-managed-keys-portal). Note the following requirements for the disk encryption set:
2727

28-
- The disk encryption set needs to be in same region and subscription as your lab.
29-
- The lab owner needs to have at least reader-level access to the disk encryption set that will be used to encrypt lab disks.
28+
- The disk encryption set needs to be in same region and subscription as your lab.
29+
- The lab owner needs to have at least reader-level access to the disk encryption set that will be used to encrypt lab disks.
3030

31-
- For labs created before 8/1/2020, the lab owner needs to ensure that lab system-assigned identity is enabled. To do so, the lab owner can go to the lab, select **Configuration and policies**, select **Identity (Preview)** in the left menu, change the system-assigned identity **Status** to **On**, and then select **Save**. For labs created after 8/1/2020, the system-assigned identity is enabled by default.
31+
- For labs created before 8/1/2020, the lab owner needs to ensure that lab system-assigned identity is enabled. To do so, the lab owner can go to the lab, select **Configuration and policies**, select **Identity (Preview)** in the left menu, change the system-assigned identity **Status** to **On**, and then select **Save**. For labs created after 8/1/2020, the system-assigned identity is enabled by default.
3232

3333
> [!div class="mx-imgBorder"]
34-
> :::image type="content" source="./media/encrypt-disks-customer-managed-keys/managed-keys.png" alt-text="Screenshot that shows the steps for enabling system-assigned identity." lightbox="./media/encrypt-disks-customer-managed-keys/managed-keys.png":::
34+
> :::image type="content" source="./media/encrypt-disks-customer-managed-keys/managed-keys.png"alt-text="Screenshot that shows the steps for enabling system-assigned identity." lightbox="./media/encrypt-disks-customer-managed-keys/managed-keys.png":::
3535
3636
- For the lab to handle encryption for all lab disks, the lab owner needs to explicitly grant the lab's system-assigned identity reader role on the disk encryption set and the virtual machine contributor role on the underlying Azure subscription. The lab owner can do that by completing the following steps:
3737

@@ -45,24 +45,24 @@ The following section shows how a lab owner can set up encryption with a custome
4545

4646
1. Assign the Virtual Machine Contributor role to the lab (system-assigned identity for the lab).
4747

48-
## Encrypt lab OS disks with a customer-managed key
48+
## Encrypt lab OS disks with a customer-managed key
4949

50-
1. On the overview page for your lab in the Azure portal, select **Configuration and policies** in the left pane.
50+
1. On the overview page for your lab in the Azure portal, select **Configuration and policies** in the left pane.
5151
1. In the left pane of the **Configuration and policies** page, select **Disks (Preview)** in the **Encryption** section. By default, **Encryption type** is set to **Encryption at-rest with a platform managed key**.
5252

5353
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/disks-page.png" alt-text="Screenshot that shows the Disks pane in Configuration and policies." lightbox="./media/encrypt-disks-customer-managed-keys/disks-page.png":::
5454

5555
1. In the **Encryption type** box, select **Encryption at-rest with a customer managed key**.
5656
1. In the **Disk encryption set** box, select the disk encryption set you created earlier. It's the same disk encryption set that the system-assigned identity of the lab can access.
57-
1. Select **Save** at the top of the pane.
57+
1. Select **Save** at the top of the pane.
5858

5959
:::image type="content" source="./media/encrypt-disks-customer-managed-keys/disk-encryption-set.png" alt-text="Screenshot that shows the steps to complete in Configuration and policies." lightbox="./media/encrypt-disks-customer-managed-keys/disk-encryption-set.png":::
6060

61-
1. A message box appears with the following message: *This setting will apply to newly created machines in the lab. Old OS disk will remain encrypted with the old disk encryption set*. Select **OK**.
61+
1. A message box appears with the following message: *This setting will apply to newly created machines in the lab. Old OS disk will remain encrypted with the old disk encryption set*. Select **OK**.
6262

63-
After this configuration, lab disks are encrypted with the customer-managed key provided in the disk encryption set.
63+
After this configuration, lab disks are encrypted with the customer-managed key provided in the disk encryption set.
6464

65-
## How to validate that disks are being encrypted
65+
## Validate that disks are being encrypted
6666

6767
1. Go to a lab virtual machine that you created after enabling disk encryption with a customer-managed key on the lab.
6868

@@ -81,5 +81,5 @@ The following section shows how a lab owner can set up encryption with a custome
8181
8282
## Related content
8383

84-
- [Azure disk encryption](/azure/virtual-machines/disk-encryption)
84+
- [Azure disk encryption](/azure/virtual-machines/disk-encryption)
8585
- [Customer-managed keys](/azure/virtual-machines/disk-encryption#customer-managed-keys)

0 commit comments

Comments
 (0)