Skip to content

Commit d9b5ba8

Browse files
authored
Merge pull request #111872 from johncdawson/patch-5
Update faq.md
2 parents ae830ed + 61555cc commit d9b5ba8

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

articles/dedicated-hsm/faq.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Microsoft has partnered with Gemalto to deliver the Azure Dedicated HSM service.
3636

3737
### Q: What is an HSM used for?
3838

39-
HSMs are used for storing cryptographic keys that are used for cryptographic functionality such as SSL (secure socket layer), encrypting data, PKI (public key infrastructure), DRM (digital rights management), and signing documents.
39+
HSMs are used for storing cryptographic keys that are used for cryptographic functionality such as TLS (transport layer security), encrypting data, PKI (public key infrastructure), DRM (digital rights management), and signing documents.
4040

4141
### Q: How does Dedicated HSM work?
4242

@@ -65,6 +65,7 @@ As of late March 2019, Dedicated HSM is available in the 14 regions listed below
6565
* East US
6666
* East US 2
6767
* West US
68+
* West US 2
6869
* South Central US
6970
* Southeast Asia
7071
* East Asia
@@ -80,6 +81,10 @@ As of late March 2019, Dedicated HSM is available in the 14 regions listed below
8081
* Canada East
8182
* Australia East
8283
* Australia Southeast
84+
* Switzerland North
85+
* Switzerland West
86+
* US Gov Virginia
87+
* US Gov Texas
8388

8489
## Interoperability
8590

@@ -128,13 +133,13 @@ Yes. Refer to the Gemalto migration guide.
128133

129134
### Q: How do I decide whether to use Azure Key Vault or Azure Dedicated HSM?
130135

131-
Azure Dedicated HSM is the appropriate choice for enterprises migrating to Azure on-premises applications that use HSMs. Dedicated HSMs present an option to migrate an application with minimal changes. If cryptographic operations are performed in the application's code running in an Azure VM or Web App, they can use Dedicated HSM. In general, shrink-wrapped software running in IaaS (infrastructure as a service) models, that support HSMs as a key store can use Dedicate HSM, such as Application gateway or traffic manager for keyless SSL, ADCS (Active Directory Certificate Services), or similar PKI tools, tools/applications used for document signing, code signing, or a SQL Server (IaaS) configured with TDE (transparent database encryption) with master key in an HSM using an EKM (extensible key management) provider. Azure Key Vault is suitable for "born-in-cloud" applications or for encryption at rest scenarios where customer data is processed by PaaS (platform as a service) or SaaS (Software as a service) scenarios such as Office 365 Customer Key, Azure Information Protection, Azure Disk Encryption, Azure Data Lake Store encryption with customer-managed key, Azure Storage encryption with customer managed key, and Azure SQL with customer managed key.
136+
Azure Dedicated HSM is the appropriate choice for enterprises migrating to Azure on-premises applications that use HSMs. Dedicated HSMs present an option to migrate an application with minimal changes. If cryptographic operations are performed in the application's code running in an Azure VM or Web App, they can use Dedicated HSM. In general, shrink-wrapped software running in IaaS (infrastructure as a service) models, that support HSMs as a key store can use Dedicate HSM, such as Application gateway or traffic manager for keyless TLS, ADCS (Active Directory Certificate Services), or similar PKI tools, tools/applications used for document signing, code signing, or a SQL Server (IaaS) configured with TDE (transparent database encryption) with master key in an HSM using an EKM (extensible key management) provider. Azure Key Vault is suitable for "born-in-cloud" applications or for encryption at rest scenarios where customer data is processed by PaaS (platform as a service) or SaaS (Software as a service) scenarios such as Office 365 Customer Key, Azure Information Protection, Azure Disk Encryption, Azure Data Lake Store encryption with customer-managed key, Azure Storage encryption with customer managed key, and Azure SQL with customer managed key.
132137

133138
### Q: What usage scenarios best suit Azure Dedicated HSM?
134139

135140
Azure Dedicated HSM is most suitable for migration scenarios. This means that if you are migrating on-premises applications to Azure that are already using HSMs. This provides a low-friction option to migrate to Azure with minimal changes to the application. If cryptographic operations are performed in the application's code running in Azure VM or Web App, Dedicated HSM may be used. In general, shrink-wrapped software running in IaaS (infrastructure as a service) models, that support HSMs as a key store can use Dedicate HSM, such as:
136141

137-
* Application gateway or traffic manager for keyless SSL
142+
* Application gateway or traffic manager for keyless TLS
138143
* ADCS (Active Directory Certificate Services)
139144
* Similar PKI tools
140145
* Tools/applications used for document signing

0 commit comments

Comments
 (0)