Skip to content

Commit dbdad59

Browse files
Merge pull request #216773 from jackrichins/patch-45
Fix HYOK section
2 parents f82c90b + 31eae0b commit dbdad59

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/security/fundamentals/encryption-models.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: security-fundamentals
1111
ms.topic: article
1212
ms.tgt_pltfrm: na
1313
ms.workload: na
14-
ms.date: 06/08/2022
14+
ms.date: 11/01/2022
1515
ms.author: mbaldwin
1616
---
1717
# Data encryption models
@@ -112,11 +112,11 @@ To obtain a key for use in encrypting or decrypting data at rest the service ide
112112

113113
## Server-side encryption using customer-managed keys in customer-controlled hardware
114114

115-
Some Azure services enable the Host Your Own Key (HYOK) key management model. This management mode is useful in scenarios where there is a need to encrypt the data at rest and manage the keys in a proprietary repository outside of Microsoft's control. In this model, the service must retrieve the key from an external site. Performance and availability guarantees are impacted, and configuration is more complex. Additionally, since the service does have access to the DEK during the encryption and decryption operations the overall security guarantees of this model are similar to when the keys are customer-managed in Azure Key Vault. As a result, this model is not appropriate for most organizations unless they have specific key management requirements. Due to these limitations, most Azure services do not support server-side encryption using server-managed keys in customer-controlled hardware.
115+
Some Azure services enable the Host Your Own Key (HYOK) key management model. This management mode is useful in scenarios where there is a need to encrypt the data at rest and manage the keys in a proprietary repository outside of Microsoft's control. In this model, the service must use the key from an external site to decrypt the Data Encryption Key (DEK). Performance and availability guarantees are impacted, and configuration is more complex. Additionally, since the service does have access to the DEK during the encryption and decryption operations the overall security guarantees of this model are similar to when the keys are customer-managed in Azure Key Vault. As a result, this model is not appropriate for most organizations unless they have specific key management requirements. Due to these limitations, most Azure services do not support server-side encryption using customer-managed keys in customer-controlled hardware. One of two keys in [Double Key Encryption](/microsoft-365/compliance/double-key-encryption) follows this model.
116116

117117
### Key Access
118118

119-
When server-side encryption using service-managed keys in customer-controlled hardware is used, the keys are maintained on a system configured by the customer. Azure services that support this model provide a means of establishing a secure connection to a customer supplied key store.
119+
When server-side encryption using customer-managed keys in customer-controlled hardware is used, the key encryption keys are maintained on a system configured by the customer. Azure services that support this model provide a means of establishing a secure connection to a customer supplied key store.
120120

121121
**Advantages**
122122

0 commit comments

Comments
 (0)