Skip to content

Commit b5b88c8

Browse files
Merge pull request #273539 from jackrichins/patch-84
Mention AES 256
2 parents eb0cbfa + 6119ed4 commit b5b88c8

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

articles/security/fundamentals/encryption-overview.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: security
77
ms.subservice: security-fundamentals
88
ms.topic: article
9-
ms.date: 11/14/2022
9+
ms.date: 04/26/2024
1010
ms.author: mbaldwin
1111
---
1212
# Azure encryption overview
@@ -17,7 +17,7 @@ This article provides an overview of how encryption is used in Microsoft Azure.
1717

1818
Data at rest includes information that resides in persistent storage on physical media, in any digital format. The media can include files on magnetic or optical media, archived data, and data backups. Microsoft Azure offers a variety of data storage solutions to meet different needs, including file, disk, blob, and table storage. Microsoft also provides encryption to protect [Azure SQL Database](/azure/azure-sql/database/sql-database-paas-overview), [Azure Cosmos DB](../../cosmos-db/database-encryption-at-rest.md), and Azure Data Lake.
1919

20-
Data encryption at rest is available for services across the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) cloud models. This article summarizes and provides resources to help you use the Azure encryption options.
20+
Data encryption at rest using AES 256 data encryption is available for services across the software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS) cloud models. This article summarizes and provides resources to help you use the Azure encryption options.
2121

2222
For a more detailed discussion of how data at rest is encrypted in Azure, see [Azure Data Encryption-at-Rest](encryption-atrest.md).
2323

@@ -46,9 +46,7 @@ The three server-side encryption models offer different key management character
4646

4747
### Azure disk encryption
4848

49-
You can protect your managed disks by using [Azure Disk Encryption for Linux VMs](../../virtual-machines/linux/disk-encryption-overview.md), which uses [DM-Crypt](https://en.wikipedia.org/wiki/Dm-crypt), or [Azure Disk Encryption for Windows VMs](../../virtual-machines/windows/disk-encryption-overview.md), which uses [Windows BitLocker](/previous-versions/windows/it-pro/windows-vista/cc766295(v=ws.10)), to protect both operating system disks and data disks with full volume encryption.
50-
51-
Encryption keys and secrets are safeguarded in your [Azure Key Vault subscription](../../key-vault/general/overview.md). By using the Azure Backup service, you can back up and restore encrypted virtual machines (VMs) that use Key Encryption Key (KEK) configuration.
49+
All Managed Disks, Snapshots, and Images are encrypted using Storage Service Encryption using a service-managed key. Azure also offers options to protect temp disks, caches, and manage keys in Azure Key Vault. For more information, see [Overview of managed disk encryption options](../../virtual-machines/disk-encryption-overview.md).
5250

5351
### Azure Storage Service Encryption
5452

@@ -112,7 +110,7 @@ Whenever Azure Customer traffic moves between datacenters-- outside physical bou
112110

113111
Microsoft gives customers the ability to use [Transport Layer Security](https://en.wikipedia.org/wiki/Transport_Layer_Security) (TLS) protocol to protect data when it’s traveling between the cloud services and customers. Microsoft datacenters negotiate a TLS connection with client systems that connect to Azure services. TLS provides strong authentication, message privacy, and integrity (enabling detection of message tampering, interception, and forgery), interoperability, algorithm flexibility, and ease of deployment and use.
114112

115-
[Perfect Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) (PFS) protects connections between customers’ client systems and Microsoft cloud services by unique keys. Connections also use RSA-based 2,048-bit encryption key lengths. This combination makes it difficult for someone to intercept and access data that is in transit.
113+
[Perfect Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) (PFS) protects connections between customers’ client systems and Microsoft cloud services by unique keys. Connections also support RSA-based 2,048-bit key lengths, ECC 256-bit key lengths, SHA-384 message authentication, and AES-256 data encryption. This combination makes it difficult for someone to intercept and access data that is in transit.
116114

117115
### Azure Storage transactions
118116

0 commit comments

Comments
 (0)