Skip to content

Commit b7d7338

Browse files
Merge pull request #232317 from MSFTeegarden/patch-19
Update cache-how-to-encryption.md
2 parents ce40374 + 1fd30f3 commit b7d7338

File tree

1 file changed

+8
-11
lines changed

1 file changed

+8
-11
lines changed

articles/azure-cache-for-redis/cache-how-to-encryption.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,22 +12,19 @@ ms.author: franlanglois
1212

1313
# Configure disk encryption for Azure Cache for Redis instances using customer managed keys (preview)
1414

15-
In this article, you learn how to configure disk encryption using Customer Managed Keys (CMK). The Enterprise and Enterprise Flash tiers of Azure Cache for Redis offer the ability to encrypt the OS and data persistence disks with customer-managed key encryption. Platform-managed keys (PMKs), also know as Microsoft-managed keys (MMKs), are used to encrypt the data. However, customer managed keys (CMK) can also be used to wrap the MMKs to control access to these keys. This makes the CMK a _key encryption key_ or KEK. For more information, see [key management in Azure](/azure/security/fundamentals/key-management).
16-
1715
Data in a Redis server is stored in memory by default. This data isn't encrypted. You can implement your own encryption on the data before writing it to the cache. In some cases, data can reside on-disk, either due to the operations of the operating system, or because of deliberate actions to persist data using [export](cache-how-to-import-export-data.md) or [data persistence](cache-how-to-premium-persistence.md).
1816

19-
> [!NOTE]
20-
> Operating system disk encryption is more important on the Premium tier because open-source Redis can page cache data to disk. The Enterprise tiers does not do page cache data to disk, which is an advantage of the Enterprise and Enterprise Flash tiers.
21-
>
17+
Azure Cache for Redis offers platform-managed keys (PMKs), also know as Microsoft-managed keys (MMKs), by default to encrypt data on-disk in all tiers. The Enterprise and Enterprise Flash tiers of Azure Cache for Redis additionally offer the ability to encrypt the OS and data persistence disks with a customer-managed key (CMK). Customer managed keys can be used to wrap the MMKs to control access to these keys. This makes the CMK a _key encryption key_ or KEK. For more information, see [key management in Azure](/azure/security/fundamentals/key-management).
18+
2219

2320
## Scope of availability for CMK disk encryption
2421

25-
|: Tier :| Basic, Standard, Premium | Enterprise, Enterprise Flash |
26-
|-----------------------------|---------|---------------|
22+
| Tier | Basic, Standard, Premium | Enterprise, Enterprise Flash |
23+
|:-:|---------|---------------|
2724
|Microsoft managed keys (MMK) | Yes | Yes |
2825
|Customer managed keys (CMK) | No | Yes (preview) |
2926

30-
> [!NOTE]
27+
> [!WARNING]
3128
> By default, all Azure Cache for Redis tiers use Microsoft managed keys to encrypt disks mounted to cache instances. However, in the Basic and Standard tiers, the C0 and C1 SKUs do not support any disk encryption.
3229
>
3330
@@ -57,14 +54,14 @@ In the **Enterprise Flash** tier, keys and values are also partially stored on-d
5754

5855
### Other tiers
5956

60-
In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted using MMK. There's no persistence disk mounted and Azure Storage is used instead.
57+
In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by default using MMK. There's no persistence disk mounted and Azure Storage is used instead. The C0 and C1 SKUs do not use disk encryption.
6158

6259
## Prerequisites and limitations
6360

6461
### General prerequisites and limitations
6562

6663
- Disk encryption isn't available in the Basic and Standard tiers for the C0 or C1 SKUs
67-
- Only user assigned managed identity is supported to connect to Azure Key Vault
64+
- Only user assigned managed identity is supported to connect to Azure Key Vault. System assigned managed identity is not supported.
6865
- Changing between MMK and CMK on an existing cache instance triggers a long-running maintenance operation. We don't recommend this for production use because a service disruption occurs.
6966

7067
### Azure Key Vault prerequisites and limitations
@@ -94,7 +91,7 @@ In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted using MM
9491
1. If using the **Select Azure key vault and key** input method, choose the Key Vault instance that holds your customer managed key. This instance must be in the same region as your cache.
9592

9693
> [!NOTE]
97-
> For instructions on how to set up an Azure Key Vault instance, see the [Azure Key Vault quickstart guide](../key-vault/secrets/quick-create-portal.md). You can also select the _Create a key vault_ link beneath the Key Vault selection to create a new Key Vault instance.
94+
> For instructions on how to set up an Azure Key Vault instance, see the [Azure Key Vault quickstart guide](../key-vault/secrets/quick-create-portal.md). You can also select the _Create a key vault_ link beneath the Key Vault selection to create a new Key Vault instance. Remember that both purge protection and soft delete must be enabled in your Key Vault instance.
9895
9996
1. Choose the specific key and version using the **Customer-managed key (RSA)** and **Version** drop-downs.
10097

0 commit comments

Comments
 (0)