Skip to content

Commit d65162a

Browse files
committed
Acrolinx
1 parent 4912b8f commit d65162a

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/virtual-machines/linux/disk-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: virtual-machines-linux
1010
ms.subservice: disks
1111
---
1212

13-
# Server side encryption of Azure managed disks
13+
# Server-side encryption of Azure managed disks
1414

1515
Azure managed disks automatically encrypt your data by default when persisting it to the cloud. Server-side encryption protects your data and helps you meet your organizational security and compliance commitments. Data in Azure managed disks is encrypted transparently using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard), one of the strongest block ciphers available, and is FIPS 140-2 compliant.
1616

@@ -38,7 +38,7 @@ For ultra disks: When you disable or rotate your key, you must shut down any VMs
3838

3939
The following diagram shows how managed disks use Azure Active Directory and Azure Key Vault to make requests using the customer-managed key:
4040

41-
![Managed disk and customer-managed keys workflow. An admin creates an Azure Key Vault, then creates a disk encryption set, and sets up the disk encryption set. The Set is associated to a VM which allows the disk to make use of Azure AD to authenticate](media/disk-storage-encryption/customer-managed-keys-sse-managed-disks-workflow.png)
41+
![Managed disk and customer-managed keys workflow. An admin creates an Azure Key Vault, then creates a disk encryption set, and sets up the disk encryption set. The Set is associated to a VM, which allows the disk to make use of Azure AD to authenticate](media/disk-storage-encryption/customer-managed-keys-sse-managed-disks-workflow.png)
4242

4343

4444
The following list explains the diagram in even more detail:

articles/virtual-machines/windows/disk-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: virtual-machines-windows
1010
ms.subservice: disks
1111
---
1212

13-
# Server side encryption of Azure managed disks
13+
# Server-side encryption of Azure managed disks
1414

1515
Azure managed disks automatically encrypt your data by default when persisting it to the cloud. Server-side encryption protects your data and helps you meet your organizational security and compliance commitments. Data in Azure managed disks is encrypted transparently using 256-bit [AES encryption](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard), one of the strongest block ciphers available, and is FIPS 140-2 compliant.
1616

@@ -38,7 +38,7 @@ For ultra disks: When you disable or rotate your key, you must shut down any VMs
3838

3939
The following diagram shows how managed disks use Azure Active Directory and Azure Key Vault to make requests using the customer-managed key:
4040

41-
![Managed disk and customer-managed keys workflow. An admin creates an Azure Key Vault, then creates a disk encryption set, and sets up the disk encryption set. The Set is associated to a VM which allows the disk to make use of Azure AD to authenticate](media/disk-storage-encryption/customer-managed-keys-sse-managed-disks-workflow.png)
41+
![Managed disk and customer-managed keys workflow. An admin creates an Azure Key Vault, then creates a disk encryption set, and sets up the disk encryption set. The Set is associated to a VM, which allows the disk to make use of Azure AD to authenticate](media/disk-storage-encryption/customer-managed-keys-sse-managed-disks-workflow.png)
4242

4343

4444
The following list explains the diagram in more detail:

0 commit comments

Comments
 (0)