Skip to content

Commit efda56a

Browse files
Merge pull request #300351 from AbhishekMallick01/May-26-2025-EEE1
Addressed EEE doc ask #26863442
2 parents 6fce901 + e8afdce commit efda56a

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/backup/encryption-at-rest-with-cmk.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Encrypt backup data by using customer-managed keys
33
description: Learn how to use Azure Backup to encrypt your backup data by using customer-managed keys (CMKs).
44
ms.topic: how-to
5-
ms.date: 07/30/2024
5+
ms.date: 05/26/2025
66
ms.custom: devx-track-azurepowershell-azurecli, devx-track-azurecli
77
ms.service: azure-backup
88
author: jyothisuri
@@ -586,6 +586,10 @@ If you don't follow the steps in the article and you proceed to protect items, t
586586

587587
Using CMK encryption for Backup doesn't incur any additional costs. But you might continue to incur costs for using your key vault where your key is stored.
588588

589+
### What happens to data encrypted with a CMK after its expiration?
590+
591+
When a Customer Managed Key (CMK) expires, it can still unwrap keys, allowing backup and restore operations to succeed. However, it cannot encrypt new vaults. To ensure continuity, enable key rotation to automatically generate a new version upon expiration. Learn about [Key types, algorithms, and operations](/azure/key-vault/keys/about-keys-details).
592+
589593
## Next steps
590594

591595
[Overview of security features in Azure Backup](security-overview.md)

0 commit comments

Comments
 (0)