Skip to content

Commit bfcd184

Browse files
committed
draft edits
1 parent 210a7f8 commit bfcd184

File tree

1 file changed

+40
-29
lines changed

1 file changed

+40
-29
lines changed

articles/reliability/reliability-key-vault.md

Lines changed: 40 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: mbaldwin
66
ms.topic: reliability-article
77
ms.custom: subject-reliability, references_regions
88
ms.service: azure-key-vault
9-
ms.date: 05/07/2025
9+
ms.date: 06/20/2025
1010
#Customer intent: As an engineer responsible for business continuity, I want to understand the details of how Azure Key Vault works from a reliability perspective and plan disaster recovery strategies in alignment with the exact processes that Azure services follow during different kinds of situations.
1111
---
1212

@@ -20,58 +20,66 @@ Azure Key Vault is a cloud service that provides a secure store for secrets, suc
2020

2121
## Production deployment recommendations
2222

23-
For production deployments of Azure Key Vault, we recommend:
23+
For production deployments of Azure Key Vault, we recommend that you:
2424

25-
- Using Standard or Premium tier key vaults
26-
- Enabling soft delete and purge protection to prevent accidental or malicious deletion
25+
- Use Standard or Premium tier key vaults
26+
- Enable soft delete and purge protection to prevent accidental or malicious deletion
2727
- For critical workloads, consider implementing multi-region strategies as described in this guide
2828

2929
## Reliability architecture overview
3030

31-
Azure Key Vault achieves redundancy by replicating your key vault and its contents within the region to ensure high durability and availability of your keys, secrets, and certificates.
31+
To ensure high durability and availability of your keys, secrets, and certificates in the event of a hardware failure or network outage, Key Vault provides multiple layers of redundancy to maintain availability during:
3232

33-
By default, the contents of your key vault are replicated within the region. If the region has a [paired region](./regions-list.md) and that paired region is in the same geography as the primary region, the contents are also replicated to the paired region. This approach ensures high durability of your keys and secrets, protecting against hardware failures, network outages, or localized disasters.
34-
35-
Key Vault provides multiple layers of redundancy to maintain availability during:
3633
- Hardware failures
3734
- Network outages
3835
- Localized disasters
3936
- Maintenance activities
4037

38+
By default, Azure Key Vault achieves redundancy by replicating your key vault and its contents within the region.
39+
40+
In addition, if the region has a [paired region](./regions-list.md) and that paired region is in the same geography as the primary region, the contents are also replicated to the paired region. This approach ensures high durability of your keys and secrets, protecting against hardware failures, network outages, or localized disasters.
41+
42+
<!-- John: I am assuming that the paired region replication is by default as well?-->
43+
44+
45+
4146
## Transient faults
4247

4348
[!INCLUDE [Transient fault description](includes/reliability-transient-fault-description-include.md)]
4449

45-
Client applications should implement retry logic when interacting with Key Vault to handle any transient failures that might occur. Some best practices include:
50+
To handle any transient failures that might occur, your client applications should implement retry logic when interacting with Key Vault. Some best practices include:
4651

47-
- Use the [Azure SDKs](https://azure.microsoft.com/downloads/), which typically include built-in retry mechanisms
48-
- If your clients connect directly to Key Vault, implement exponential backoff retry policies
49-
- Cache secrets in memory when possible to reduce direct requests to Key Vault
50-
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling
52+
- Use the [Azure SDKs](https://azure.microsoft.com/downloads/), which typically include built-in retry mechanisms.
53+
- If your clients connect directly to Key Vault, implement exponential backoff retry policies.
54+
- Cache secrets in memory when possible to reduce direct requests to Key Vault.
55+
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling.
5156

5257
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits. Azure Key Vault has specific guidance for these scenarios:
5358

54-
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys)
55-
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions
56-
- A subscription-wide limit for all transaction types is five times the individual key vault limit
57-
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults)
58-
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material
59+
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys).
60+
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions.
61+
- A subscription-wide limit for all transaction types is five times the individual key vault limit.
62+
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults).
63+
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material.
5964

6065
For comprehensive throttling guidance, see [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
6166

6267
## Availability zone support
6368

6469
[!INCLUDE [AZ support description](includes/reliability-availability-zone-description-include.md)]
6570

66-
Azure Key Vault automatically provides zone redundancy in regions with availability zones available, providing high availability within a region without requiring any specific configuration. When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability. For more information, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
71+
Azure Key Vault automatically provides zone redundancy in [regions that support availability zones](./regions-list.md), providing high availability within a region without requiring any specific configuration.
72+
73+
74+
When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability.
6775

6876
### Region support
6977

70-
Azure Key Vault is available in [all Azure regions that support availability zones](./regions-list.md). Key Vault enables zone redundancy automatically in these regions.
78+
Azure Key Vault enables zone redundancy by default in [all Azure regions that support availability zones](./regions-list.md).
7179

7280
### Requirements
7381

74-
All Key Vault SKUs (Standard and Premium) support the same level of availability and resiliency. There are no specific tier requirements to achieve zone resilience with Azure Key Vault.
82+
All Key Vault SKUs (Standard and Premium) support the same level of availability and resiliency. There aren't any tier-specific requirements to achieve zone resilience.
7583

7684
### Cost
7785

@@ -99,7 +107,10 @@ The following section describes what to expect when key vaults are in a region w
99107

100108
- **Expected downtime:** For read operations, there should be minimal to no downtime during a zone failure. Write operations might experience temporary unavailability while the service adjusts to the zone failure. Read operations are expected to remain available during zone failures.
101109

102-
- **Traffic rerouting:** Key Vault automatically reroutes traffic away from the affected zone to healthy zones without requiring any customer intervention.
110+
- **Traffic rerouting:** Key Vault automatically reroutes traffic away from the affected zone to healthy zones without requiring any customer intervention.
111+
112+
113+
For more information on the zone-down experience, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
103114

104115
### Failback
105116

@@ -171,20 +182,20 @@ There are situations where the Microsoft-managed cross-region failover capabilit
171182

172183
You can design a custom cross-region failover solution. One approach is to:
173184

174-
1. Create separate key vaults in different regions
175-
1. Use the backup and restore functionality to maintain consistent secrets across regions
176-
1. Implement application-level logic to fail over between key vaults
185+
1. Create separate key vaults in different regions.
186+
1. Use the backup and restore functionality to maintain consistent secrets across regions.
187+
1. Implement application-level logic to fail over between key vaults.
177188

178189
## Backups
179190

180191
Azure Key Vault provides the ability to back up and restore individual secrets, keys, and certificates. Backups are intended to provide you with an offline copy of your secrets in the unlikely event that you lose access to your key vault.
181192

182193
Key points about the backup functionality:
183194

184-
- Backups create encrypted blobs that can't be decrypted outside of Azure
185-
- Backups can only be restored to a key vault within the same Azure subscription and Azure geography
186-
- There's a limitation of backing up no more than 500 past versions of a key, secret, or certificate object
187-
- Backups are point-in-time snapshots and don't automatically update when secrets change
195+
- Backups create encrypted blobs that can't be decrypted outside of Azure.
196+
- Backups can only be restored to a key vault within the same Azure subscription and Azure geography.
197+
- There's a limitation of backing up no more than 500 past versions of a key, secret, or certificate object.
198+
- Backups are point-in-time snapshots and don't automatically update when secrets change.
188199

189200
For most solutions, you shouldn't rely exclusively on backups. Instead, use the other capabilities described in this guide to support your resiliency requirements. However, backups protect against some risks that other approaches don't, such as accidental deletion of specific secrets.
190201

0 commit comments

Comments
 (0)