You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Bring your own keys (BYOK) with Azure disks in Azure Kubernetes Service (AKS)
9
+
# Bring your own keys (BYOK) with Azure managed disks in Azure Kubernetes Service (AKS)
10
10
11
-
Azure Storage encrypts all data in a storage account at rest. By default, data is encrypted with Microsoft-managed keys. For more control over encryption keys, you can supply customer-managed keys to use for encryption at rest for both the OS and data disks for your AKS clusters.
11
+
Azure encrypts all data in a managed disk at rest. By default, data is encrypted with Microsoft-managed keys. For more control over encryption keys, you can supply customer-managed keys to use for encryption at rest for both the OS and data disks for your AKS clusters.
12
12
13
13
Learn more about customer-managed keys on [Linux][customer-managed-keys-linux] and [Windows][customer-managed-keys-windows].
14
14
@@ -21,9 +21,9 @@ Learn more about customer-managed keys on [Linux][customer-managed-keys-linux] a
21
21
22
22
## Limitations
23
23
24
-
* Encryption of OS disk with customer-managed keys can only be enabled when creating an AKS cluster.
24
+
* Encryption of an OS disk with customer-managed keys can only be enabled when creating an AKS cluster.
25
25
* Virtual nodes are not supported.
26
-
* When encrypting ephemeral OS disk-enabled node pool with customer-managed keys, if you want to rotate the key in Azure Key Vault, you need to:
26
+
* When encrypting an ephemeral OS disk-enabled node pool with customer-managed keys, if you want to rotate the key in Azure Key Vault, you need to:
0 commit comments