You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/encryption-customer-managed-keys.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Use customer-managed keys with Azure Key Vault to manage account encryption
3
3
titleSuffix: Azure Storage
4
-
description: You can manage Azure Storage encryption at the level of the storage account with your own keys. When you specify a customer-managed key at the level of the storage account, that key is used to protect and control access to the root encryption key for the storage account. The root encryption key is in turn used to encrypt and decrypt all data.
4
+
description: You can use your own encryption key to protect the data in your storage account. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Customer-managed keys offer greater flexibility to manage access controls.
5
5
services: storage
6
6
author: tamram
7
7
@@ -15,7 +15,7 @@ ms.subservice: common
15
15
16
16
# Use customer-managed keys with Azure Key Vault to manage Azure Storage encryption
17
17
18
-
You can manage Azure Storage encryption at the level of the storage account with your own keys. When you specify a customer-managed key at the level of the storage account, that key is used to protect and control access to the root encryption key for the storage account. The root encryption key is in turn used to encrypt and decrypt all data. Customer-managed keys offer greater flexibility to manage access controls. You can also audit the encryption keys used to protect your data.
18
+
You can use your own encryption key to protect the data in your storage account. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Customer-managed keys offer greater flexibility to manage access controls.
19
19
20
20
You must use Azure Key Vault to store your customer-managed keys. You can either create your own keys and store them in a key vault, or you can use the Azure Key Vault APIs to generate keys. The storage account and the key vault must be in the same region and in the same Azure Active Directory (Azure AD) tenant, but they can be in different subscriptions. For more information about Azure Key Vault, see [What is Azure Key Vault?](../../key-vault/key-vault-overview.md).
21
21
@@ -31,19 +31,21 @@ The following list explains the numbered steps in the diagram:
31
31
2. An Azure Storage admin configures encryption with a customer-managed key for the storage account.
32
32
3. Azure Storage uses the managed identity that's associated with the storage account to authenticate access to Azure Key Vault via Azure Active Directory.
33
33
4. Azure Storage wraps the account encryption key with the customer key in Azure Key Vault.
34
-
5. For read/write operations, Azure Storage sends requests to Azure Key Vault to wrap and unwrap the account encryption key to perform encryption and decryption operations.
34
+
5. For read/write operations, Azure Storage sends requests to Azure Key Vault to unwrap the account encryption key to perform encryption and decryption operations.
35
35
36
36
## Create an account that supports customer-managed keys for queues and tables
37
37
38
-
To use customer-managed keys with Queue and Table storage, you must first create a storage account that uses an encryption key that is scoped to the account. After you have created the account, you can enable customer-managed keys for that account. For more information about how to create a storage account that supports customer-managed keys for queues and tables, see [Create an account that supports customer-managed keys for tables and queues](account-encryption-key-create.md).
38
+
Data stored in the Queue and Table services is not automatically protected by a customer-managed key when customer-managed keys are enabled for the storage account. You can optionally configure these services at the time that you create the storage account to be included in this protection.
39
39
40
-
Creating an account that relies on the account encryption key is not necessary to use customer-managed keys with Blob storage or Azure Files. This step is necessary only for using customer-managed keys with Queue or Table storage.
40
+
For more information about how to create a storage account that supports customer-managed keys for queues and tables, see [Create an account that supports customer-managed keys for tables and queues](account-encryption-key-create.md).
41
+
42
+
Data in the Blob and File services is always protected by customer-managed keys when customer-managed keys are configured for the storage account.
41
43
42
44
## Enable customer-managed keys for a storage account
43
45
44
-
When you configure a customer-managed key, Azure Storage wraps the root data encryption key for the account with the customer-managed key in the associated key vault. Enabling customer-managed keys does not impact performance, and takes effect immediately.
46
+
Customer-managed keys can enabled only on existing storage accounts. The key vault must be provisioned with access policies that grant key permissions to the managed identity that is associated with the storage account. The managed identity is available only after the storage account is created.
45
47
46
-
A new storage account is always encrypted using Microsoft-managed keys. It's not possible to enable customer-managed keys at the time that the account is created. The key vault must be provisioned with access policies that grant key permissions to the managed identity that is associated with the storage account. The managed identity is available only after the storage account is created.
48
+
When you configure a customer-managed key, Azure Storage wraps the root data encryption key for the account with the customer-managed key in the associated key vault. Enabling customer-managed keys does not impact performance, and takes effect immediately.
47
49
48
50
When you modify the key being used for Azure Storage encryption by enabling or disabling customer-managed keys, updating the key version, or specifying a different key, then the encryption of the root key changes, but the data in your Azure Storage account does not need to be re-encrypted.
0 commit comments