Skip to content

Commit a2af0d9

Browse files
Merge pull request #265886 from Ije-oyibo/patch-1
Updating Keys with Cactus
2 parents 6633eb5 + 1f8e520 commit a2af0d9

File tree

2 files changed

+15
-7
lines changed

2 files changed

+15
-7
lines changed

articles/key-vault/keys/about-keys-details.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,14 @@ In addition to the key material, the following attributes may be specified. In a
123123
There are more read-only attributes that are included in any response that includes key attributes:
124124

125125
- *created*: IntDate, optional. The *created* attribute indicates when this version of the key was created. The value is null for keys created prior to the addition of this attribute. Its value MUST be a number containing an IntDate value.
126-
- *updated*: IntDate, optional. The *updated* attribute indicates when this version of the key was updated. The value is null for keys that were last updated prior to the addition of this attribute. Its value MUST be a number containing an IntDate value.
126+
- *updated*: IntDate, optional. The *updated* attribute indicates when this version of the key was updated. The value is null for keys that were last updated prior to the addition of this attribute. Its value MUST be a number containing an IntDate value.
127+
- *hsmPlatform*: string, optional. The underlying HSM Platform that is protecting a key.
128+
- A hsmPlatform value of 2 means the key is protected by our latest FIPS 140 Level 3 validated HSM platform.
129+
- A hsmPlatform value of 1 means the key is protected by our previous FIPS 140 Level 2 HSM platform using nCipher HSMs.
130+
- A hsmPlatform value of 0 means the key is protected by a FIPS 140 Level 1 HSM software cryptographic module.
131+
- if this is not set by a Managed HSM pool, it is protected by our latest FIPS 140 Level 3 validated HSM platform.
132+
133+
It’s important to note that keys are bound to the HSM in which they were created. New keys are seamlessly created and stored in the new HSMs. While there is no way to migrate or transfer keys, new key versions are automatically in the new HSMs. For more information on how to migrate to a new key, see [How to migrate key workloads](../general/migrate-key-workloads.md).
127134

128135
For more information on IntDate and other data types, see [About keys, secrets, and certificates: [Data types](../general/about-keys-secrets-certificates.md#data-types).
129136

articles/key-vault/keys/about-keys.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ tags: azure-resource-manager
99
ms.service: key-vault
1010
ms.subservice: keys
1111
ms.topic: overview
12-
ms.date: 01/24/2023
12+
ms.date: 02/09/2024
1313
ms.author: mbaldwin
1414
---
1515

@@ -38,9 +38,9 @@ Cryptographic keys in Key Vault are represented as JSON Web Key [JWK] objects. T
3838

3939
The base JWK/JWA specifications are also extended to enable key types unique to the Azure Key Vault and Managed HSM implementations.
4040

41-
HSM-protected keys (also referred to as HSM-keys) are processed in an HSM (Hardware Security Module) and always remain HSM protection boundary.
41+
HSM Keys in vaults are protected". The Software keys are not protected by HSMs.
4242

43-
- Vaults use **FIPS 140-2 Level 2** validated HSMs to protect HSM-keys in shared HSM backend infrastructure.
43+
- Keys stored in vaults benefit from robust protection using **FIPS 140-2 HSMs**. There are two distinct HSM platforms available: 1, which protects key versions with **FIPS 140-2 Level 2** and 2, which protects keys with **FIPS 140-2 Level 3** HSMs depending on when the key was created. All new keys and key versions are now created using platform 2 (except UK geo). To determine which HSM Platform is protecting a key version, get it's [hsmPlatform](about-keys-details.md#key-attributes).
4444
- Managed HSM uses **FIPS 140-2 Level 3** validated HSM modules to protect your keys. Each HSM pool is an isolated single-tenant instance with its own [security domain](../managed-hsm/security-domain.md) providing complete cryptographic isolation from all other HSMs sharing the same hardware infrastructure.
4545

4646
These keys are protected in single-tenant HSM-pools. You can import an RSA, EC, and symmetric key, in soft form or by exporting from a supported HSM device. You can also generate keys in HSM pools. When you import HSM keys using the method described in the [BYOK (bring your own key) specification](../keys/byok-specification.md), it enables secure transportation key material into Managed HSM pools.
@@ -72,9 +72,10 @@ Key Vault supports RSA and EC keys. Managed HSM supports RSA, EC, and symmetric
7272

7373
|Key type and destination|Compliance|
7474
|---|---|
75-
|Software-protected keys in vaults (Premium & Standard SKUs) | FIPS 140-2 Level 1|
76-
|HSM-protected keys in vaults (Premium SKU)| FIPS 140-2 Level 2|
77-
|HSM-protected keys in Managed HSM|FIPS 140-2 Level 3|
75+
|Software-protected (hsmPlatform 0) keys in vaults | FIPS 140-2 Level 1|
76+
|hsmPlatform 1 protected keys in vaults (Premium SKU)| FIPS 140-2 Level 2|
77+
|hsmPlatform 2 protected keys in vaults (Premium SKU)| FIPS 140-2 Level 3|
78+
|Keys in Managed HSM are always HSM protected|FIPS 140-2 Level 3|
7879
|||
7980

8081
See [Key types, algorithms, and operations](about-keys-details.md) for details about each key type, algorithms, operations, attributes, and tags.

0 commit comments

Comments
 (0)