Skip to content

Commit c438f6e

Browse files
committed
update
1 parent 44963a0 commit c438f6e

File tree

4 files changed

+11
-15
lines changed

4 files changed

+11
-15
lines changed

articles/security/fundamentals/key-management-choose.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,6 @@ Here is a list of the key management solutions we commonly see being utilized ba
9393
- [Key management in Azure](key-management.md)
9494
- [Azure Key Vault](/azure/key-vault/general/overview)
9595
- [Azure Managed HSM](/azure/key-vault/managed-hsm/overview)
96-
- [Azure Cloud HSM](/azure/dedicated-hsm/overview)
97-
- [Azure Payment HSM](/azure/payment-hsm/overview)
98-
- [What is Zero Trust?](/security/zero-trust/zero-trust-overview)
96+
- [Azure Cloud HSM](/azure/cloud-hsm/overview)
9997
- [Azure Payment HSM](/azure/payment-hsm/overview)
10098
- [What is Zero Trust?](/security/zero-trust/zero-trust-overview)

articles/security/fundamentals/key-management.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,32 +28,31 @@ Customer-managed keys can be stored on-premises or, more commonly, in a cloud ke
2828

2929
## Azure key management services
3030

31-
Azure offers several options for storing and managing your keys in the cloud, including Azure Key Vault, Azure Managed HSM, Azure Cloud HSM Preview, Azure Dedicated HSM, and Azure Payment HSM. These options differ in terms of their FIPS compliance level, management overhead, and intended applications.
31+
Azure offers several options for storing and managing your keys in the cloud, including Azure Key Vault, Azure Managed HSM, Azure Cloud HSM Preview, and Azure Payment HSM. These options differ in terms of their FIPS compliance level, management overhead, and intended applications.
3232

3333
For an overview of each key management service and a comprehensive guide to choosing the right key management solution for you, see [How to Choose the Right Key Management Solution](key-management-choose.md).
3434

3535
### Pricing
3636

37-
The Azure Key Vault Standard and Premium tiers are billed on a transactional basis, with an extra monthly per-key charge for premium hardware-backed keys. Managed HSM, Cloud HSM Preview, Dedicated HSM, and Payments HSM don't charge on a transactional basis; instead they are always-in-use devices that are billed at a fixed hourly rate. For detailed pricing information, see [Key Vault pricing](https://azure.microsoft.com/pricing/details/key-vault), [Dedicated HSM pricing](https://azure.microsoft.com/pricing/details/azure-dedicated-hsm), and [Payment HSM pricing](https://azure.microsoft.com/pricing/details/payment-hsm).
37+
The Azure Key Vault Standard and Premium tiers are billed on a transactional basis, with an extra monthly per-key charge for premium hardware-backed keys. Managed HSM, Cloud HSM Preview, and Payments HSM don't charge on a transactional basis; instead they are always-in-use devices that are billed at a fixed hourly rate. For detailed pricing information, see [Key Vault pricing](https://azure.microsoft.com/pricing/details/key-vault) and [Payment HSM pricing](https://azure.microsoft.com/pricing/details/payment-hsm).
3838

3939
### Service Limits
4040

41-
Managed HSM, Cloud HSM Preview, Dedicated HSM, and Payments HSM offer dedicated capacity. Key Vault Standard and Premium are multitenant offerings and have throttling limits. For service limits, see [Key Vault service limits](/azure/key-vault/general/service-limits).
41+
Managed HSM, Cloud HSM Preview, and Payments HSM offer dedicated capacity. Key Vault Standard and Premium are multitenant offerings and have throttling limits. For service limits, see [Key Vault service limits](/azure/key-vault/general/service-limits).
4242

4343
### Encryption-At-Rest
4444

45-
Azure Key Vault and Azure Key Vault Managed HSM have integrations with Azure Services and Microsoft 365 for Customer Managed Keys, meaning customers may use their own keys in Azure Key Vault and Azure Managed HSM for encryption-at-rest of data stored in these services. Cloud HSM Preview, Dedicated HSM, and Payments HSM are Infrastructure-as-Service offerings and do not offer integrations with Azure Services. For an overview of encryption-at-rest with Azure Key Vault and Managed HSM, see [Azure Data Encryption-at-Rest](encryption-atrest.md).
45+
Azure Key Vault and Azure Key Vault Managed HSM have integrations with Azure Services and Microsoft 365 for Customer Managed Keys, meaning customers may use their own keys in Azure Key Vault and Azure Managed HSM for encryption-at-rest of data stored in these services. Cloud HSM Preview and Payments HSM are Infrastructure-as-Service offerings and do not offer integrations with Azure Services. For an overview of encryption-at-rest with Azure Key Vault and Managed HSM, see [Azure Data Encryption-at-Rest](encryption-atrest.md).
4646

4747
### APIs
4848

49-
Cloud HSM Preview, Dedicated HSM, and Payments HSM support the PKCS#11, JCE/JCA, and KSP/CNG APIs, but Azure Key Vault and Managed HSM do not. Azure Key Vault and Managed HSM use the Azure Key Vault REST API and offer SDK support. For more information on the Azure Key Vault API, see [Azure Key Vault REST API Reference](/rest/api/keyvault/).
49+
Cloud HSM Preview and Payments HSM support the PKCS#11, JCE/JCA, and KSP/CNG APIs, but Azure Key Vault and Managed HSM do not. Azure Key Vault and Managed HSM use the Azure Key Vault REST API and offer SDK support. For more information on the Azure Key Vault API, see [Azure Key Vault REST API Reference](/rest/api/keyvault/).
5050

5151
## What's next
5252

5353
- [How to Choose the Right Key Management Solution](key-management-choose.md)
5454
- [Azure Key Vault](/azure/key-vault/general/overview)
5555
- [Azure Managed HSM](/azure/key-vault/managed-hsm/overview)
5656
- [Azure Cloud HSM Preview](/azure/cloud-hsm/overview)
57-
- [Azure Dedicated HSM](/azure/dedicated-hsm/overview)
5857
- [Azure Payment HSM](/azure/payment-hsm/overview)
5958
- [What is Zero Trust?](/security/zero-trust/zero-trust-overview)

articles/security/fundamentals/zero-trust.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,21 +6,20 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
manager: rkarlin
10-
ms.date: 04/23/2025
9+
ms.date: 07/31/2025
1110
---
1211

1312
# Zero Trust security
1413

15-
Zero Trust is a new security model that assumes breach and verifies each request as though it originated from an uncontrolled network. In this article, you'll learn about the guiding principles of Zero Trust and find resources to help you implement Zero Trust.
14+
Zero Trust is a security model that assumes breach and verifies each request as though it originated from an uncontrolled network. In this article, you'll learn about the guiding principles of Zero Trust and find resources to help you implement Zero Trust.
1615

1716
## Guiding principles of Zero Trust
1817

1918
Today, organizations need a new security model that effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.
2019

2120
To address this new world of computing, Microsoft highly recommends the Zero Trust security model, which is based on these guiding principles:
2221

23-
- **Verify explicitly** - Always authenticate and authorize based on all available data points.
22+
- **Verify explicitly** - Always authenticate and authorize based on all available data points, including user identity, location, device health, and service or workload.
2423
- **Use least privilege access** - Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
2524
- **Assume breach** - Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
2625

@@ -63,6 +62,7 @@ The Microsoft approach to Zero Trust includes [Conditional Access](../../active-
6362
To learn more about creating an access model based on Conditional Access that's aligned with the guiding principles of Zero Trust, see [Conditional Access for Zero Trust](/azure/architecture/guide/security/conditional-access-design).
6463

6564
## Develop apps using Zero Trust principles
65+
6666
Zero Trust is a security framework that does not rely on the implicit trust afforded to interactions behind a secure network perimeter. Instead, it uses the principles of explicit verification, least privileged access, and assuming breach to keep users and data secure while allowing for common scenarios like access to applications from outside the network perimeter.
6767

6868
As a developer, it is essential that you use Zero Trust principles to keep users safe and data secure. App developers can improve app security, minimize the impact of breaches, and ensure that their applications meet their customers' security requirements by adopting Zero Trust principles.
@@ -73,6 +73,7 @@ For more information on best practices key to keeping your apps secure, see:
7373
- [Build Zero Trust-ready apps using Microsoft identity platform features and tools](../../active-directory/develop/zero-trust-for-developers.md)
7474

7575
## Zero Trust and Microsoft 365
76+
7677
Microsoft 365 is built with many security and information protection capabilities to help you build Zero Trust into your environment. Many of the capabilities can be extended to protect access to other SaaS apps your organization uses and the data within these apps. See [deploying Zero Trust for Microsoft 365](/microsoft-365/security/microsoft-365-zero-trust#deploying-zero-trust-for-microsoft-365) to learn more.
7778

7879
To learn about recommendations and core concepts for deploying secure email, docs, and apps policies and configurations for Zero Trust access to Microsoft 365, see [Zero Trust identity and device access configurations](/microsoft-365/security/office-365-security/microsoft-365-policies-configurations).

articles/security/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -190,8 +190,6 @@ additionalContent:
190190
text: Azure Key Vault
191191
- url: /azure/key-vault/managed-hsm/
192192
text: Azure Managed HSM
193-
- url: /azure/dedicated-hsm/
194-
text: Azure Dedicated HSM
195193
- url: /azure/payment-hsm/
196194
text: Azure Payment-HSM
197195

0 commit comments

Comments
 (0)