You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/keys/about-keys.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ The base JWK/JWA specifications are also extended to enable key types unique to
40
40
41
41
HSM-protected keys (also referred to as HSM-keys) are processed in an HSM (Hardware Security Module) and always remain HSM protection boundary.
42
42
43
-
- Key in vault are protected using FIPS 140-2 HSMs. These HSMs are either FIPS 140-2 Level 2 or Level 3 HSMs depending on when the key was created. To determine which HSM Platform is protecting a key version, get it's [HSMPlatform](about-keys-details.md#key-attributes).
43
+
- Key in vault are protected using **FIPS 140-2 HSMs**. These HSMs are either **FIPS 140-2 Level 2** or **FIPS 140-2 Level 3** HSMs depending on when the key was created. To determine which HSM Platform is protecting a key version, get it's [hsmPlatform](about-keys-details.md#key-attributes).
44
44
- Managed HSM uses **FIPS 140-2 Level 3** validated HSM modules to protect your keys. Each HSM pool is an isolated single-tenant instance with its own [security domain](../managed-hsm/security-domain.md) providing complete cryptographic isolation from all other HSMs sharing the same hardware infrastructure.
45
45
46
46
These keys are protected in single-tenant HSM-pools. You can import an RSA, EC, and symmetric key, in soft form or by exporting from a supported HSM device. You can also generate keys in HSM pools. When you import HSM keys using the method described in the [BYOK (bring your own key) specification](../keys/byok-specification.md), it enables secure transportation key material into Managed HSM pools.
@@ -73,9 +73,9 @@ Key Vault supports RSA and EC keys. Managed HSM supports RSA, EC, and symmetric
73
73
|Key type and destination|Compliance|
74
74
|---|---|
75
75
|Software-protected keys in vaults (Premium & Standard SKUs) | FIPS 140-2 Level 1|
76
-
|HSMPlatform 1 protected keys in vaults (Premium SKU)| FIPS 140-2 Level 2|
77
-
|HSMPlatform 2 protected keys in vaults (Premium SKU)| FIPS 140-2 Level 3|
78
-
|HSM-protected keys in Managed HSM|FIPS 140-2 Level 3|
76
+
|hsmPlatform 1 protected keys in vaults (Premium SKU)| FIPS 140-2 Level 2|
77
+
|hsmPlatform 2 protected keys in vaults (Premium SKU)| FIPS 140-2 Level 3|
78
+
|Keys in Managed HSM are always HSM protected|FIPS 140-2 Level 3|
79
79
|||
80
80
81
81
See [Key types, algorithms, and operations](about-keys-details.md) for details about each key type, algorithms, operations, attributes, and tags.
0 commit comments