Skip to content

Commit a67f392

Browse files
Merge pull request #269591 from AbhishekMallick-MS/main
Minor changes
2 parents 786cdb7 + 5d42c88 commit a67f392

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/backup/backup-architecture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Architecture Overview
33
description: Provides an overview of the architecture, components, and processes used by the Azure Backup service.
44
ms.topic: conceptual
5-
ms.date: 03/19/2024
5+
ms.date: 03/20/2024
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -224,11 +224,11 @@ When you restore VMs with managed disks, you can restore to a complete VM with m
224224
- During the restore process, Azure handles the managed disks. If you're using the storage account option, you manage the storage account that's created during the restore process.
225225
- If you restore a managed VM that's encrypted, make sure the VM's keys and secrets exist in the key vault before you start the restore process.
226226

227-
## DaData isolation with Azure Backup
227+
## Data isolation with Azure Backup
228228

229229
With Azure Backup, the vaulted backup data is stored in Microsoft-managed Azure subscription and tenant. External users or guests have no direct access to this backup storage or its contents, ensuring the isolation of backup data from the production environment where the data source resides.
230230

231-
In Azure, all communications and data in transit is securely transferred with *HTTPS* and *TLS 1.2+* protocols. This data remains on the Azure backbone network ensuring reliable and efficient data transmission. The backup data at rest is encrypted by default using *Microsoft-managed keys*. You can also bring your own keys for encryption if you require greater control over the data. To enhance protection, you can use [immutability](security-overview.md#immutable-vaults), which prevents data from being altered or deleted before its retention period. Azure Backup gives you diverse options such as [soft delete](security-overview.md#soft-delete), stop backup and delete data or retain data if you need to stop backups at any time. To protect critical operations, you can add [Multi-User Authorization (MUA)](security-overview.md#multi-user-authorization) that adds additional layer of protection by using an Azure resource called Azure Resource Guard (ARG).
231+
In Azure, all communications and data in transit is securely transferred with *HTTPS* and *TLS 1.2+* protocols. This data remains on the Azure backbone network ensuring reliable and efficient data transmission. The backup data at rest is encrypted by default using *Microsoft-managed keys*. You can also bring your own keys for encryption if you require greater control over the data. To enhance protection, you can use [immutability](backup-azure-immutable-vault-concept.md), which prevents data from being altered or deleted before its retention period. Azure Backup gives you diverse options such as [soft delete](backup-azure-enhanced-soft-delete-about.md), stop backup and delete data or retain data if you need to stop backups at any time. To protect critical operations, you can add [Multi-User Authorization (MUA)](multi-user-authorization-concept.md) that adds additional layer of protection by using an Azure resource called Azure Resource Guard.
232232

233233
This robust approach ensures that even in a compromised environment, existing backups cannot be tampered with or deleted by unauthorized users.
234234

articles/backup/security-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of security features
33
description: Learn about security capabilities in Azure Backup that help you protect your backup data and meet the security needs of your business.
44
ms.topic: conceptual
5-
ms.date: 03/19/2024
5+
ms.date: 03/20/2024
66
author: AbhishekMallick-MS
77
ms.author: v-abhmallick
88
---
@@ -25,11 +25,11 @@ Learn more about [Azure role-based access control to manage Azure Backup](./back
2525

2626
Azure Backup has several security controls built into the service to prevent, detect, and respond to security vulnerabilities. Learn more about [security controls for Azure Backup](./security-baseline.md).
2727

28-
## DaData isolation with Azure Backup
28+
## Data isolation with Azure Backup
2929

3030
With Azure Backup, the vaulted backup data is stored in Microsoft-managed Azure subscription and tenant. External users or guests have no direct access to this backup storage or its contents, ensuring the isolation of backup data from the production environment where the data source resides.
3131

32-
In Azure, all communications and data in transit is securely transferred with *HTTPS* and *TLS 1.2+* protocols. This data remains on the Azure backbone network ensuring reliable and efficient data transmission. The backup data at rest is encrypted by default using *Microsoft-managed keys*. You can also bring your own keys for encryption if you require greater control over the data. To enhance protection, you can use [immutability](#immutable-vaults), which prevents data from being altered or deleted before its retention period. Azure Backup gives you diverse options such as [soft delete](#soft-delete), stop backup and delete data or retain data if you need to stop backups at any time. To protect critical operations, you can add [Multi-User Authorization (MUA)](#multi-user-authorization) that adds additional layer of protection by using an Azure resource called Azure Resource Guard (ARG).
32+
In Azure, all communications and data in transit is securely transferred with *HTTPS* and *TLS 1.2+* protocols. This data remains on the Azure backbone network ensuring reliable and efficient data transmission. The backup data at rest is encrypted by default using *Microsoft-managed keys*. You can also bring your own keys for encryption if you require greater control over the data. To enhance protection, you can use [immutability](backup-azure-immutable-vault-concept.md), which prevents data from being altered or deleted before its retention period. Azure Backup gives you diverse options such as [soft delete](backup-azure-enhanced-soft-delete-about.md), stop backup and delete data or retain data if you need to stop backups at any time. To protect critical operations, you can add [Multi-User Authorization (MUA)](multi-user-authorization-concept.md) that adds additional layer of protection by using an Azure resource called Azure Resource Guard.
3333

3434
This robust approach ensures that even in a compromised environment, existing backups cannot be tampered with or deleted by unauthorized users.
3535

0 commit comments

Comments
 (0)