Skip to content

Commit e77e3a8

Browse files
committed
Updated to clarify encryption availability, acrolinx
1 parent 64f8487 commit e77e3a8

File tree

1 file changed

+16
-19
lines changed

1 file changed

+16
-19
lines changed

articles/azure-cache-for-redis/cache-how-to-encryption.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,11 @@
11
---
22
title: Configure disk encryption in Azure Cache for Redis
33
description: Learn about disk encryption when using Azure Cache for Redis.
4-
5-
6-
74
ms.topic: how-to
8-
ms.date: 02/28/2024
5+
ms.date: 07/09/2025
96
appliesto:
107
- ✅ Azure Cache for Redis
118

12-
139
---
1410

1511
# Configure disk encryption for Azure Cache for Redis instances using customer managed keys
@@ -20,13 +16,13 @@ Azure Cache for Redis offers platform-managed keys (PMKs), also know as Microsof
2016

2117
## Scope of availability for CMK disk encryption
2218

23-
| Tier | Basic, Standard, Premium | Enterprise, Enterprise Flash |
24-
|:-:|---------|---------------|
25-
|Microsoft managed keys (MMK) | Yes | Yes |
26-
|Customer managed keys (CMK) | No | Yes |
19+
| Tier | Basic*, Standard*, Premium | Enterprise, Enterprise Flash |
20+
|:-----------------------------:|------------------------------------------------------------------------------------------------|------------------------------|
21+
| Microsoft managed keys (MMK) | In most cache sizes. Disk encryption isn't supported for Basic and Standard sizes C0 and C1. | Yes |
22+
| Customer managed keys (CMK) | No | Yes |
2723

2824
> [!WARNING]
29-
> By default, all Azure Cache for Redis tiers use Microsoft managed keys to encrypt disks mounted to cache instances. However, in the Basic and Standard tiers, the C0 and C1 SKUs do not support any disk encryption.
25+
> By default, all Azure Cache for Redis tiers use Microsoft managed keys to encrypt disks mounted to cache instances. However, in the Basic and Standard tiers, the C0 and C1 SKUs don't support any disk encryption.
3026
>
3127

3228
> [!IMPORTANT]
@@ -47,22 +43,22 @@ MMK is used to encrypt these disks by default, but CMK can also be used.
4743

4844
In the **Enterprise Flash** tier, keys and values are also partially stored on-disk using nonvolatile memory express (NVMe) flash storage. However, this disk isn't the same as the one used for persisted data. Instead, it's ephemeral, and data isn't persisted after the cache is stopped, deallocated, or rebooted. MMK is only supported on this disk because this data is transient and ephemeral.
4945

50-
| Data stored |Disk |Encryption Options |
51-
|-------------------|------------------|-------------------|
52-
|Persistence files | Persistence disk | MMK or CMK |
53-
|RDB files waiting to be exported | OS disk and Persistence disk | MMK or CMK |
54-
|Keys & values (Enterprise Flash tier only) | Transient NVMe disk | MMK |
46+
| Data stored | Disk | Encryption Options |
47+
|------------------------------------------------|-------------------------------|--------------------|
48+
| Persistence files | Persistence disk | MMK or CMK |
49+
| RDB files waiting to be exported | OS disk and Persistence disk | MMK or CMK |
50+
| Keys & values (Enterprise Flash tier only) | Transient NVMe disk | MMK |
5551

5652
### Other tiers
5753

58-
In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by default using MMK. There's no persistence disk mounted and Azure Storage is used instead. The C0 and C1 SKUs do not use disk encryption.
54+
In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by default using MMK. There's no persistence disk mounted and Azure Storage is used instead. The C0 and C1 SKUs don't use disk encryption.
5955

6056
## Prerequisites and limitations
6157

6258
### General prerequisites and limitations
6359

6460
- Disk encryption isn't available in the Basic and Standard tiers for the C0 or C1 SKUs
65-
- Only user assigned managed identity is supported to connect to Azure Key Vault. System assigned managed identity is not supported.
61+
- Only user assigned managed identity is supported to connect to Azure Key Vault. System assigned managed identity isn't supported.
6662
- Changing between MMK and CMK on an existing cache instance triggers a long-running maintenance operation. We don't recommend this for production use because a service disruption occurs.
6763

6864
### Azure Key Vault prerequisites and limitations
@@ -100,13 +96,13 @@ In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by defau
10096

10197
1. If using the **URI** input method, enter the Key Identifier URI for your chosen key from Azure Key Vault.
10298

103-
1. When you've entered all the information for your cache, select **Review + create**.
99+
1. When you enter all the information for your cache, select **Review + create**.
104100

105101
### Add CMK encryption to an existing Enterprise cache
106102

107103
1. Go to the **Encryption** in the Resource menu of your cache instance. If CMK is already set up, you see the key information.
108104

109-
1. If you haven't set up or if you want to change CMK settings, select **Change encryption settings**
105+
1. If you haven't set up CMK or want to change CMK settings, select **Change encryption settings**.
110106
:::image type="content" source="media/cache-how-to-encryption/cache-encryption-existing-use.png" alt-text="Screenshot encryption selected in the Resource menu for an Enterprise tier cache.":::
111107

112108
1. Select **Use a customer-managed key** to see your configuration options.
@@ -133,3 +129,4 @@ Learn more about Azure Cache for Redis features:
133129

134130
- [Data persistence](cache-how-to-premium-persistence.md)
135131
- [Import/Export](cache-how-to-import-export-data.md)
132+
- [Import/Export](cache-how-to-import-export-data.md)

0 commit comments

Comments
 (0)