Skip to content

Commit 9fff826

Browse files
authored
Merge pull request #183750 from TerryLanfear/sec-2112a
update per Brian Lehr
2 parents 232b2a7 + f4f80db commit 9fff826

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/security/fundamentals/double-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 08/13/2020
16+
ms.date: 12/28/2021
1717
ms.author: terrylan
1818
---
1919
# Double encryption
@@ -35,7 +35,7 @@ Microsoft’s approach to enabling two layers of encryption for data at rest is:
3535
Microsoft’s approach to enabling two layers of encryption for data in transit is:
3636

3737
- **Transit encryption using Transport Layer Security (TLS) 1.2 to protect data when it’s traveling between the cloud services and you**. All traffic leaving a datacenter is encrypted in transit, even if the traffic destination is another domain controller in the same region. TLS 1.2 is the default security protocol used. TLS provides strong authentication, message privacy, and integrity (enabling detection of message tampering, interception, and forgery), interoperability, algorithm flexibility, and ease of deployment and use.
38-
- **Additional layer of encryption provided at the infrastructure layer**. A data-link layer encryption method using the IEEE 802.1AE MAC Security Standards (also known as MACsec) is applied from point-to-point across the underlying network hardware. Whenever Azure Customer traffic moves between datacenters-- outside physical boundaries not controlled by Microsoft (or on behalf of Microsoft)-- The packets are encrypted and decrypted on the devices before being sent, preventing physical “man-in-the-middle” or snooping/wiretapping attacks. Because this technology is integrated on the network hardware itself, it provides line rate encryption on the network hardware with no measurable link latency increase. This MACsec encryption is on by default for all Azure traffic traveling within a region or between regions, and no action is required on customers’ part to enable.
38+
- **Additional layer of encryption provided at the infrastructure layer**. Whenever Azure customer traffic moves between datacenters-- outside physical boundaries not controlled by Microsoft or on behalf of Microsoft-- a data-link layer encryption method using the [IEEE 802.1AE MAC Security Standards](https://1.ieee802.org/security/802-1ae/) (also known as MACsec) is applied from point-to-point across the underlying network hardware. The packets are encrypted and decrypted on the devices before being sent, preventing physical “man-in-the-middle” or snooping/wiretapping attacks. Because this technology is integrated on the network hardware itself, it provides line rate encryption on the network hardware with no measurable link latency increase. This MACsec encryption is on by default for all Azure traffic traveling within a region or between regions, and no action is required on customers’ part to enable.
3939

4040
## Next steps
4141
Learn how [encryption is used in Azure](encryption-overview.md).

0 commit comments

Comments
 (0)