Skip to content

Commit 9a652cf

Browse files
committed
Updates
1 parent 39b92ed commit 9a652cf

File tree

2 files changed

+17
-17
lines changed

2 files changed

+17
-17
lines changed

articles/key-vault/managed-hsm/disaster-recovery-guide.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: What to do if there if an Azure service disruption that affects Managed HSM - Azure Key Vault | Microsoft Docs
3-
description: Learn what to do f there is an Azure service disruption that affects Managed HSM.
2+
title: What to do if there's an Azure service disruption that affects Managed HSM - Azure Key Vault | Microsoft Docs
3+
description: Learn what to do if there's an Azure service disruption that affects Managed HSM.
44
services: key-vault
55
author: mbaldwin
66

77
ms.service: key-vault
88
ms.subservice: general
99
ms.topic: tutorial
10-
ms.date: 09/15/2020
10+
ms.date: 01/04/2023
1111
ms.author: mbaldwin
1212
---
1313

@@ -27,7 +27,7 @@ Here are the steps of the disaster recovery procedure:
2727

2828
1. Create a new HSM Instance.
2929
2. Activate "Security Domain recovery". A new RSA key pair (Security Domain Exchange Key) will be generated for Security Domain transfer and sent in response, which will be downloaded as a SecurityDomainExchangeKey (public key).
30-
3. Create and then upload the "Security Domain Transfer File". You will need the private keys that encrypt the security domain. The private keys are used locally, and never transferred anywhere in this process.
30+
3. Create and then upload the "Security Domain Transfer File". You'll need the private keys that encrypt the security domain. The private keys are used locally, and never transferred anywhere in this process.
3131
4. Take a backup of the new HSM. A backup is required before any restore, even when the HSM is empty. Backups allow for easy roll-back.
3232
5. Restore the recent HSM backup from the source HSM.
3333

@@ -67,15 +67,15 @@ Your Azure account is now authorized to perform any operations on this Managed H
6767

6868
## Activate the Security Domain recovery mode
6969

70-
At this point in the normal creation process, we initialize and download the new HSM's Security Domain. However, since we are executing a disaster recovery procedure, we request the HSM to enter Security Domain Recovery Mode and download a Security Domain Exchange Key instead. The Security Domain Exchange Key is an RSA public key that will be used to encrypt the security domain before uploading it to the HSM. The corresponding private key is protected inside the HSM, to keep your Security Domain contents safe during the transfer.
70+
At this point in the normal creation process, we initialize and download the new HSM's Security Domain. However, since we're executing a disaster recovery procedure, we request the HSM to enter Security Domain Recovery Mode and download a Security Domain Exchange Key instead. The Security Domain Exchange Key is an RSA public key that will be used to encrypt the security domain before uploading it to the HSM. The corresponding private key is protected inside the HSM, to keep your Security Domain contents safe during the transfer.
7171

7272
```azurecli-interactive
7373
az keyvault security-domain init-recovery --hsm-name ContosoMHSM2 --sd-exchange-key ContosoMHSM2-SDE.cer
7474
```
7575

7676
## Upload Security Domain to destination HSM
7777

78-
For this step you will need:
78+
For this step you'll need:
7979
- The Security Domain Exchange Key you downloaded in previous step.
8080
- The Security Domain of the source HSM.
8181
- At least quorum number of private keys that were used to encrypt the security domain.
@@ -96,9 +96,9 @@ Now both the source HSM (ContosoMHSM) and the destination HSM (ContosoMHSM2) hav
9696

9797
## Create a backup (as a restore point) of your new HSM
9898

99-
It is always a good idea to take a full backup before you execute a full HSM restore, so that you have a restore point in case something goes wrong with the restore.
99+
It's always a good idea to take a full backup before you execute a full HSM restore, so that you have a restore point in case something goes wrong with the restore.
100100

101-
To create an HSM backup, you will need:
101+
To create an HSM backup, you'll need:
102102
- A storage account where the backup will be stored
103103
- A blob storage container in this storage account where the backup process will create a new folder to store encrypted backup
104104

@@ -117,7 +117,7 @@ az keyvault backup start --hsm-name ContosoMHSM2 --storage-account-name ContosoB
117117

118118
For this step you need:
119119

120-
- The storage account and the blob container where the source HSM's backups are stored.
120+
- The storage account and the blob container in which the source HSM's backups are stored.
121121
- The folder name from where you want to restore the backup. If you create regular backups, there will be many folders inside this container.
122122

123123

@@ -128,7 +128,7 @@ sas=$(az storage container generate-sas -n mhsmdemobackupcontainer --account-nam
128128
az keyvault restore start --hsm-name ContosoMHSM2 --storage-account-name ContosoBackup --blob-container-name mhsmdemobackupcontainer --storage-container-SAS-token $sas --backup-folder mhsm-ContosoMHSM-2020083120161860
129129
```
130130

131-
Now you have completed a full disaster recovery process. The contents of the source HSM when the backup was taken are copied to the destination HSM, including all the keys, versions, attributes, tags, and role assignments.
131+
Now you've completed a full disaster recovery process. The contents of the source HSM when the backup was taken are copied to the destination HSM, including all the keys, versions, attributes, tags, and role assignments.
132132

133133
## Next steps
134134

articles/key-vault/managed-hsm/hsm-protected-keys-byok.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ tags: azure-resource-manager
77

88
ms.service: key-vault
99
ms.topic: conceptual
10-
ms.date: 02/04/2021
10+
ms.date: 01/04/2023
1111
ms.author: mbaldwin
1212
---
1313

@@ -30,8 +30,8 @@ Here's an overview of the process. Specific steps to complete are described late
3030
* Download the KEK public key as a .pem file.
3131
* Transfer the KEK public key to an offline computer that is connected to an on-premises HSM.
3232
* In the offline computer, use the BYOK tool provided by your HSM vendor to create a BYOK file.
33-
* The target key is encrypted with a KEK, which stays encrypted until it is transferred to the Managed HSM. Only the encrypted version of your key leaves the on-premises HSM.
34-
* A KEK that's generated inside a Managed HSM is not exportable. HSMs enforce the rule that no clear version of a KEK exists outside a Managed HSM.
33+
* The target key is encrypted with a KEK, which stays encrypted until it's transferred to the Managed HSM. Only the encrypted version of your key leaves the on-premises HSM.
34+
* A KEK that's generated inside a Managed HSM isn't exportable. HSMs enforce the rule that no clear version of a KEK exists outside a Managed HSM.
3535
* The KEK must be in the same managed HSM where the target key will be imported.
3636
* When the BYOK file is uploaded to Managed HSM, a Managed HSM uses the KEK private key to decrypt the target key material and import it as an HSM key. This operation happens entirely inside the HSM. The target key always remains in the HSM protection boundary.
3737

@@ -46,13 +46,13 @@ To use the Azure CLI commands in this article, you must have the following items
4646

4747
[!INCLUDE [cloud-shell-try-it.md](../../../includes/cloud-shell-try-it.md)]
4848

49-
To sign in to Azure using the CLI you can type:
49+
To sign in to Azure using the CLI, type:
5050

5151
```azurecli
5252
az login
5353
```
5454

55-
For more information on login options via the CLI take a look at [sign in with Azure CLI](/cli/azure/authenticate-azure-cli)
55+
For more information on login options via the CLI, take a look at [sign in with Azure CLI](/cli/azure/authenticate-azure-cli)
5656

5757
## Supported HSMs
5858

@@ -101,7 +101,7 @@ The KEK must be:
101101
> [!NOTE]
102102
> The KEK must have 'import' as the only allowed key operation. 'import' is mutually exclusive with all other key operations.
103103
104-
Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create) command to create a KEK that has key operations set to `import`. Record the key identifier (`kid`) that's returned from the following command. (You will use the `kid` value in [Step 3](#step-3-generate-and-prepare-your-key-for-transfer).)
104+
Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create) command to create a KEK that has key operations set to `import`. Record the key identifier (`kid`) that's returned from the following command. (You'll use the `kid` value in [Step 3](#step-3-generate-and-prepare-your-key-for-transfer).)
105105

106106
```azurecli-interactive
107107
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --hsm-name ContosoKeyVaultHSM
@@ -118,7 +118,7 @@ az keyvault key download --name KEKforBYOK --hsm-name ContosoKeyVaultHSM --file
118118
```
119119
---
120120

121-
Transfer the KEKforBYOK.publickey.pem file to your offline computer. You will need this file in the next step.
121+
Transfer the KEKforBYOK.publickey.pem file to your offline computer. You'll need this file in the next step.
122122

123123
### Step 3: Generate and prepare your key for transfer
124124

0 commit comments

Comments
 (0)