You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/customer-managed-keys.md
+18-13Lines changed: 18 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This article provides background information and steps to configure a [customer-
16
16
17
17
- The CMK capability requires a Log Analytics dedicated cluster with at least a 500 GB/day commitment tier. Multiple workspaces can be linked to the same dedicated cluster, and they will share the same customer-managed key.
18
18
19
-
- After you complete the steps in this guide and before you use the workspace, for onboarding confirmation, contact the [Microsoft Sentinel Product Group](mailto:[email protected]).
19
+
- After you complete the steps in this guide and before you use the workspace, you must contact the [Microsoft Sentinel Product Group](mailto:[email protected]) for onboarding confirmation.
20
20
21
21
- Learn about [Log Analytics Dedicated Cluster Pricing](../azure-monitor/logs/logs-dedicated-clusters.md#cluster-pricing-model).
22
22
@@ -26,7 +26,7 @@ This article provides background information and steps to configure a [customer-
26
26
27
27
- The Microsoft Sentinel CMK capability is provided only to *workspaces in Log Analytics dedicated clusters* that have *not already been onboarded to Microsoft Sentinel*.
28
28
29
-
- The following CMK-related changes *are not supported* because they will be ineffective (Microsoft Sentinel data will continue to be encrypted only by the Microsoft-managed key, and not by the CMK):
29
+
- The following CMK-related changes *are not supported* because they are ineffective (Microsoft Sentinel data continues to be encrypted only by the Microsoft-managed key, and not by the CMK):
30
30
31
31
- Enabling CMK on a workspace that's *already onboarded* to Microsoft Sentinel.
32
32
- Enabling CMK on a cluster that contains Sentinel-onboarded workspaces.
@@ -43,18 +43,19 @@ This article provides background information and steps to configure a [customer-
43
43
- Changing the customer-managed key to another key (with another URI) currently *isn't supported*. You should change the key by [rotating it](../azure-monitor/logs/customer-managed-keys.md#key-rotation).
44
44
45
45
- Before you make any CMK changes to a production workspace or to a Log Analytics cluster, contact the [Microsoft Sentinel Product Group](mailto:[email protected]).
46
+
- CMK enabled workspaces don't support [search jobs](investigate-large-datasets.md).
46
47
47
48
## How CMK works
48
49
49
-
The Microsoft Sentinel solution uses several storage resources for log collection and features, including a Log Analytics dedicated cluster. As part of the Microsoft Sentinel CMK configuration, you will have to configure the CMK settings on the related Log Analytics dedicated cluster. Data saved by Microsoft Sentinel in storage resources other than Log Analytics will also be encrypted using the customer-managed key configured for the dedicated Log Analytics cluster.
50
+
The Microsoft Sentinel solution uses several storage resources for log collection and features, including a Log Analytics dedicated cluster. As part of the Microsoft Sentinel CMK configuration, you must configure the CMK settings on the related Log Analytics dedicated cluster. Data saved by Microsoft Sentinel in storage resources other than Log Analytics is also encrypted using the customer-managed key configured for the dedicated Log Analytics cluster.
50
51
51
-
See the following additional relevant documentation:
> If you enable CMK on Microsoft Sentinel, any Public Preview feature that does not support CMK will not be enabled.
58
+
> If you enable CMK on Microsoft Sentinel, any Public Preview feature that does not support CMK aren't enabled.
58
59
59
60
## Enable CMK
60
61
@@ -67,8 +68,8 @@ To provision CMK, follow these steps:
67
68
3. Register to the Azure Cosmos DB Resource Provider.
68
69
69
70
4. Add an access policy to your Azure Key Vault instance.
70
-
71
-
5. Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://github.com/Azure/Azure-Sentinel/raw/master/docs/Azure%20Sentinel%20management.docx).
71
+
5. Contact the Microsoft Sentinel Product group to confirm onboarding
72
+
6. Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://github.com/Azure/Azure-Sentinel/raw/master/docs/Azure%20Sentinel%20management.docx).
72
73
73
74
### STEP 1: Create an Azure Key Vault and generate or import a key
74
75
@@ -85,7 +86,7 @@ To provision CMK, follow these steps:
85
86
86
87
### STEP 2: Enable CMK on your Log Analytics workspace
87
88
88
-
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/logs/customer-managed-keys.md) in order to create a CMK workspace that will be used as the Microsoft Sentinel workspace in the following steps.
89
+
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/logs/customer-managed-keys.md) in order to create a CMK workspace that is used as the Microsoft Sentinel workspace in the following steps.
89
90
90
91
### STEP 3: Register to the Azure Cosmos DB Resource Provider
91
92
@@ -97,19 +98,23 @@ Follow the instructions to [Register the Azure Cosmos DB Resource Provider](../c
97
98
98
99
Make sure to add access from Azure Cosmos DB to your Azure Key Vault instance. Follow the Azure Cosmos DB instructions to [add an access policy to your Azure Key Vault instance](../cosmos-db/how-to-setup-cmk.md#add-access-policy) with an Azure Cosmos DB principal.
99
100
100
-
### STEP 5: Onboard the workspace to Microsoft Sentinel via the onboarding API
101
+
### STEP 5: Contact the Microsoft Sentinel Product group to confirm onboarding
102
+
103
+
You must confirm onboarding of your CMK enabled workspace by contacting the [Microsoft Sentinel Product Group](mailto:[email protected]).
104
+
105
+
### STEP 6: Onboard the workspace to Microsoft Sentinel via the onboarding API
101
106
102
107
Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://github.com/Azure/Azure-Sentinel/raw/master/docs/Azure%20Sentinel%20management.docx).
103
108
104
109
## Key Encryption Key revocation or deletion
105
110
106
-
In the event that a user revokes the key encryption key (the CMK), either by deleting it or removing access for the dedicated cluster and Azure Cosmos DB Resource Provider, Microsoft Sentinel will honor the change and behave as if the data is no longer available, within one hour. At this point, any operation that uses persistent storage resources such as data ingestion, persistent configuration changes, and incident creation, will be prevented. Previously stored data will not be deleted but will remain inaccessible. Inaccessible data is governed by the data-retention policy and will be purged in accordance with that policy.
111
+
If a user revokes the key encryption key (the CMK), either by deleting it or removing access for the dedicated cluster and Azure Cosmos DB Resource Provider, Microsoft Sentinel honors the change and behave as if the data is no longer available, within one hour. At this point, any operation that uses persistent storage resources such as data ingestion, persistent configuration changes, and incident creation, is prevented. Previously stored data isn't deleted but remains inaccessible. Inaccessible data is governed by the data-retention policy and is purged in accordance with that policy.
107
112
108
113
The only operation possible after the encryption key is revoked or deleted is account deletion.
109
114
110
-
If access is restored after revocation, Microsoft Sentinel will restore access to the data within an hour.
115
+
If access is restored after revocation, Microsoft Sentinel restores access to the data within an hour.
111
116
112
-
Access to the data can be revoked by disabling the customer-managed key in the key vault, or deleting the access policy to the key, for both the dedicated Log Analytics cluster and Azure Cosmos DB. Revoking access by removing the key from the dedicated Log Analytics cluster, or by removing the identity associated with the dedicated Log Analytics cluster is not supported.
117
+
Access to the data can be revoked by disabling the customer-managed key in the key vault, or deleting the access policy to the key, for both the dedicated Log Analytics cluster and Azure Cosmos DB. Revoking access by removing the key from the dedicated Log Analytics cluster, or by removing the identity associated with the dedicated Log Analytics cluster isn't supported.
113
118
114
119
To understand more about how this works in Azure Monitor, see [Azure Monitor CMK revocation](../azure-monitor/logs/customer-managed-keys.md#key-revocation).
115
120
@@ -127,7 +132,7 @@ After rotating a key, you must explicitly update the dedicated Log Analytics clu
127
132
128
133
## Replacing a customer-managed key
129
134
130
-
Microsoft Sentinel does not support replacing a customer-managed key. You should use the [key rotation capability](#customer-managed-key-rotation) instead.
135
+
Microsoft Sentinel doesn't support replacing a customer-managed key. You should use the [key rotation capability](#customer-managed-key-rotation) instead.
131
136
132
137
## Next steps
133
138
In this document, you learned how to set up a customer-managed key in Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:
0 commit comments