You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/disaster-recovery-guide.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
-
title: What to do if there if an Azure service disruption that affects Managed HSM - Azure Key Vault | Microsoft Docs
3
-
description: Learn what to do f there is an Azure service disruption that affects Managed HSM.
2
+
title: What to do if there's an Azure service disruption that affects Managed HSM - Azure Key Vault | Microsoft Docs
3
+
description: Learn what to do if there's an Azure service disruption that affects Managed HSM.
4
4
services: key-vault
5
5
author: mbaldwin
6
6
7
7
ms.service: key-vault
8
8
ms.subservice: general
9
9
ms.topic: tutorial
10
-
ms.date: 09/15/2020
10
+
ms.date: 01/04/2023
11
11
ms.author: mbaldwin
12
12
---
13
13
@@ -27,7 +27,7 @@ Here are the steps of the disaster recovery procedure:
27
27
28
28
1. Create a new HSM Instance.
29
29
2. Activate "Security Domain recovery". A new RSA key pair (Security Domain Exchange Key) will be generated for Security Domain transfer and sent in response, which will be downloaded as a SecurityDomainExchangeKey (public key).
30
-
3. Create and then upload the "Security Domain Transfer File". You will need the private keys that encrypt the security domain. The private keys are used locally, and never transferred anywhere in this process.
30
+
3. Create and then upload the "Security Domain Transfer File". You'll need the private keys that encrypt the security domain. The private keys are used locally, and never transferred anywhere in this process.
31
31
4. Take a backup of the new HSM. A backup is required before any restore, even when the HSM is empty. Backups allow for easy roll-back.
32
32
5. Restore the recent HSM backup from the source HSM.
33
33
@@ -67,15 +67,15 @@ Your Azure account is now authorized to perform any operations on this Managed H
67
67
68
68
## Activate the Security Domain recovery mode
69
69
70
-
At this point in the normal creation process, we initialize and download the new HSM's Security Domain. However, since we are executing a disaster recovery procedure, we request the HSM to enter Security Domain Recovery Mode and download a Security Domain Exchange Key instead. The Security Domain Exchange Key is an RSA public key that will be used to encrypt the security domain before uploading it to the HSM. The corresponding private key is protected inside the HSM, to keep your Security Domain contents safe during the transfer.
70
+
At this point in the normal creation process, we initialize and download the new HSM's Security Domain. However, since we're executing a disaster recovery procedure, we request the HSM to enter Security Domain Recovery Mode and download a Security Domain Exchange Key instead. The Security Domain Exchange Key is an RSA public key that will be used to encrypt the security domain before uploading it to the HSM. The corresponding private key is protected inside the HSM, to keep your Security Domain contents safe during the transfer.
71
71
72
72
```azurecli-interactive
73
73
az keyvault security-domain init-recovery --hsm-name ContosoMHSM2 --sd-exchange-key ContosoMHSM2-SDE.cer
74
74
```
75
75
76
76
## Upload Security Domain to destination HSM
77
77
78
-
For this step you will need:
78
+
For this step you'll need:
79
79
- The Security Domain Exchange Key you downloaded in previous step.
80
80
- The Security Domain of the source HSM.
81
81
- At least quorum number of private keys that were used to encrypt the security domain.
@@ -96,9 +96,9 @@ Now both the source HSM (ContosoMHSM) and the destination HSM (ContosoMHSM2) hav
96
96
97
97
## Create a backup (as a restore point) of your new HSM
98
98
99
-
It is always a good idea to take a full backup before you execute a full HSM restore, so that you have a restore point in case something goes wrong with the restore.
99
+
It's always a good idea to take a full backup before you execute a full HSM restore, so that you have a restore point in case something goes wrong with the restore.
100
100
101
-
To create an HSM backup, you will need:
101
+
To create an HSM backup, you'll need:
102
102
- A storage account where the backup will be stored
103
103
- A blob storage container in this storage account where the backup process will create a new folder to store encrypted backup
Now you have completed a full disaster recovery process. The contents of the source HSM when the backup was taken are copied to the destination HSM, including all the keys, versions, attributes, tags, and role assignments.
131
+
Now you've completed a full disaster recovery process. The contents of the source HSM when the backup was taken are copied to the destination HSM, including all the keys, versions, attributes, tags, and role assignments.
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/hsm-protected-keys-byok.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ tags: azure-resource-manager
7
7
8
8
ms.service: key-vault
9
9
ms.topic: conceptual
10
-
ms.date: 02/04/2021
10
+
ms.date: 01/04/2023
11
11
ms.author: mbaldwin
12
12
---
13
13
@@ -30,8 +30,8 @@ Here's an overview of the process. Specific steps to complete are described late
30
30
* Download the KEK public key as a .pem file.
31
31
* Transfer the KEK public key to an offline computer that is connected to an on-premises HSM.
32
32
* In the offline computer, use the BYOK tool provided by your HSM vendor to create a BYOK file.
33
-
* The target key is encrypted with a KEK, which stays encrypted until it is transferred to the Managed HSM. Only the encrypted version of your key leaves the on-premises HSM.
34
-
* A KEK that's generated inside a Managed HSM is not exportable. HSMs enforce the rule that no clear version of a KEK exists outside a Managed HSM.
33
+
* The target key is encrypted with a KEK, which stays encrypted until it's transferred to the Managed HSM. Only the encrypted version of your key leaves the on-premises HSM.
34
+
* A KEK that's generated inside a Managed HSM isn't exportable. HSMs enforce the rule that no clear version of a KEK exists outside a Managed HSM.
35
35
* The KEK must be in the same managed HSM where the target key will be imported.
36
36
* When the BYOK file is uploaded to Managed HSM, a Managed HSM uses the KEK private key to decrypt the target key material and import it as an HSM key. This operation happens entirely inside the HSM. The target key always remains in the HSM protection boundary.
37
37
@@ -46,13 +46,13 @@ To use the Azure CLI commands in this article, you must have the following items
For more information on login options via the CLI take a look at [sign in with Azure CLI](/cli/azure/authenticate-azure-cli)
55
+
For more information on login options via the CLI, take a look at [sign in with Azure CLI](/cli/azure/authenticate-azure-cli)
56
56
57
57
## Supported HSMs
58
58
@@ -101,7 +101,7 @@ The KEK must be:
101
101
> [!NOTE]
102
102
> The KEK must have 'import' as the only allowed key operation. 'import' is mutually exclusive with all other key operations.
103
103
104
-
Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create) command to create a KEK that has key operations set to `import`. Record the key identifier (`kid`) that's returned from the following command. (You will use the `kid` value in [Step 3](#step-3-generate-and-prepare-your-key-for-transfer).)
104
+
Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create) command to create a KEK that has key operations set to `import`. Record the key identifier (`kid`) that's returned from the following command. (You'll use the `kid` value in [Step 3](#step-3-generate-and-prepare-your-key-for-transfer).)
0 commit comments