Skip to content

Commit e8afdce

Browse files
author
AbhishekMallick01
committed
Addressed EEE doc ask #26863442
1 parent 722027a commit e8afdce

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/backup/encryption-at-rest-with-cmk.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Encrypt backup data by using customer-managed keys
33
description: Learn how to use Azure Backup to encrypt your backup data by using customer-managed keys (CMKs).
44
ms.topic: how-to
5-
ms.date: 07/30/2024
5+
ms.date: 05/26/2025
66
ms.custom: devx-track-azurepowershell-azurecli, devx-track-azurecli
77
ms.service: azure-backup
88
author: jyothisuri
@@ -586,6 +586,10 @@ If you don't follow the steps in the article and you proceed to protect items, t
586586

587587
Using CMK encryption for Backup doesn't incur any additional costs. But you might continue to incur costs for using your key vault where your key is stored.
588588

589+
### What happens to data encrypted with a CMK after its expiration?
590+
591+
When a Customer Managed Key (CMK) expires, it can still unwrap keys, allowing backup and restore operations to succeed. However, it cannot encrypt new vaults. To ensure continuity, enable key rotation to automatically generate a new version upon expiration. Learn about [Key types, algorithms, and operations](/azure/key-vault/keys/about-keys-details).
592+
589593
## Next steps
590594

591595
[Overview of security features in Azure Backup](security-overview.md)

0 commit comments

Comments
 (0)