Skip to content

Commit f76483b

Browse files
authored
Merge pull request #235116 from cwatson-cat/patch-16
Update CMK workspace - add step and considerations
2 parents 5526a6c + 078e5fa commit f76483b

File tree

1 file changed

+18
-13
lines changed

1 file changed

+18
-13
lines changed

articles/sentinel/customer-managed-keys.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This article provides background information and steps to configure a [customer-
1616

1717
- The CMK capability requires a Log Analytics dedicated cluster with at least a 500 GB/day commitment tier. Multiple workspaces can be linked to the same dedicated cluster, and they will share the same customer-managed key.
1818

19-
- After you complete the steps in this guide and before you use the workspace, for onboarding confirmation, contact the [Microsoft Sentinel Product Group](mailto:[email protected]).
19+
- After you complete the steps in this guide and before you use the workspace, you must contact the [Microsoft Sentinel Product Group](mailto:[email protected]) for onboarding confirmation.
2020

2121
- Learn about [Log Analytics Dedicated Cluster Pricing](../azure-monitor/logs/logs-dedicated-clusters.md#cluster-pricing-model).
2222

@@ -26,7 +26,7 @@ This article provides background information and steps to configure a [customer-
2626

2727
- The Microsoft Sentinel CMK capability is provided only to *workspaces in Log Analytics dedicated clusters* that have *not already been onboarded to Microsoft Sentinel*.
2828

29-
- The following CMK-related changes *are not supported* because they will be ineffective (Microsoft Sentinel data will continue to be encrypted only by the Microsoft-managed key, and not by the CMK):
29+
- The following CMK-related changes *are not supported* because they are ineffective (Microsoft Sentinel data continues to be encrypted only by the Microsoft-managed key, and not by the CMK):
3030

3131
- Enabling CMK on a workspace that's *already onboarded* to Microsoft Sentinel.
3232
- Enabling CMK on a cluster that contains Sentinel-onboarded workspaces.
@@ -43,18 +43,19 @@ This article provides background information and steps to configure a [customer-
4343
- Changing the customer-managed key to another key (with another URI) currently *isn't supported*. You should change the key by [rotating it](../azure-monitor/logs/customer-managed-keys.md#key-rotation).
4444

4545
- Before you make any CMK changes to a production workspace or to a Log Analytics cluster, contact the [Microsoft Sentinel Product Group](mailto:[email protected]).
46+
- CMK enabled workspaces don't support [search jobs](investigate-large-datasets.md).
4647

4748
## How CMK works
4849

49-
The Microsoft Sentinel solution uses several storage resources for log collection and features, including a Log Analytics dedicated cluster. As part of the Microsoft Sentinel CMK configuration, you will have to configure the CMK settings on the related Log Analytics dedicated cluster. Data saved by Microsoft Sentinel in storage resources other than Log Analytics will also be encrypted using the customer-managed key configured for the dedicated Log Analytics cluster.
50+
The Microsoft Sentinel solution uses several storage resources for log collection and features, including a Log Analytics dedicated cluster. As part of the Microsoft Sentinel CMK configuration, you must configure the CMK settings on the related Log Analytics dedicated cluster. Data saved by Microsoft Sentinel in storage resources other than Log Analytics is also encrypted using the customer-managed key configured for the dedicated Log Analytics cluster.
5051

51-
See the following additional relevant documentation:
52+
For more information, see:
5253
- [Azure Monitor customer-managed keys (CMK)](../azure-monitor/logs/customer-managed-keys.md).
5354
- [Azure Key Vault](../key-vault/general/overview.md).
5455
- [Log Analytics dedicated clusters](../azure-monitor/logs/logs-dedicated-clusters.md).
5556

5657
> [!NOTE]
57-
> If you enable CMK on Microsoft Sentinel, any Public Preview feature that does not support CMK will not be enabled.
58+
> If you enable CMK on Microsoft Sentinel, any Public Preview feature that does not support CMK aren't enabled.
5859
5960
## Enable CMK
6061

@@ -67,8 +68,8 @@ To provision CMK, follow these steps: 
6768
3. Register to the Azure Cosmos DB Resource Provider.
6869

6970
4. Add an access policy to your Azure Key Vault instance.
70-
71-
5. Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://github.com/Azure/Azure-Sentinel/raw/master/docs/Azure%20Sentinel%20management.docx).
71+
5. Contact the Microsoft Sentinel Product group to confirm onboarding
72+
6. Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://github.com/Azure/Azure-Sentinel/raw/master/docs/Azure%20Sentinel%20management.docx).
7273

7374
### STEP 1: Create an Azure Key Vault and generate or import a key
7475

@@ -85,7 +86,7 @@ To provision CMK, follow these steps: 
8586

8687
### STEP 2: Enable CMK on your Log Analytics workspace
8788

88-
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/logs/customer-managed-keys.md) in order to create a CMK workspace that will be used as the Microsoft Sentinel workspace in the following steps.
89+
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/logs/customer-managed-keys.md) in order to create a CMK workspace that is used as the Microsoft Sentinel workspace in the following steps.
8990

9091
### STEP 3: Register to the Azure Cosmos DB Resource Provider
9192

@@ -97,19 +98,23 @@ Follow the instructions to [Register the Azure Cosmos DB Resource Provider](../c
9798

9899
Make sure to add access from Azure Cosmos DB to your Azure Key Vault instance. Follow the Azure Cosmos DB instructions to [add an access policy to your Azure Key Vault instance](../cosmos-db/how-to-setup-cmk.md#add-access-policy) with an Azure Cosmos DB principal.
99100

100-
### STEP 5: Onboard the workspace to Microsoft Sentinel via the onboarding API
101+
### STEP 5: Contact the Microsoft Sentinel Product group to confirm onboarding
102+
103+
You must confirm onboarding of your CMK enabled workspace by contacting the [Microsoft Sentinel Product Group](mailto:[email protected]).
104+
105+
### STEP 6: Onboard the workspace to Microsoft Sentinel via the onboarding API
101106

102107
Onboard the workspace to Microsoft Sentinel via the [Onboarding API](https://github.com/Azure/Azure-Sentinel/raw/master/docs/Azure%20Sentinel%20management.docx).
103108

104109
## Key Encryption Key revocation or deletion
105110

106-
In the event that a user revokes the key encryption key (the CMK), either by deleting it or removing access for the dedicated cluster and Azure Cosmos DB Resource Provider, Microsoft Sentinel will honor the change and behave as if the data is no longer available, within one hour. At this point, any operation that uses persistent storage resources such as data ingestion, persistent configuration changes, and incident creation, will be prevented. Previously stored data will not be deleted but will remain inaccessible. Inaccessible data is governed by the data-retention policy and will be purged in accordance with that policy.
111+
If a user revokes the key encryption key (the CMK), either by deleting it or removing access for the dedicated cluster and Azure Cosmos DB Resource Provider, Microsoft Sentinel honors the change and behave as if the data is no longer available, within one hour. At this point, any operation that uses persistent storage resources such as data ingestion, persistent configuration changes, and incident creation, is prevented. Previously stored data isn't deleted but remains inaccessible. Inaccessible data is governed by the data-retention policy and is purged in accordance with that policy.
107112

108113
The only operation possible after the encryption key is revoked or deleted is account deletion.
109114

110-
If access is restored after revocation, Microsoft Sentinel will restore access to the data within an hour.
115+
If access is restored after revocation, Microsoft Sentinel restores access to the data within an hour.
111116

112-
Access to the data can be revoked by disabling the customer-managed key in the key vault, or deleting the access policy to the key, for both the dedicated Log Analytics cluster and Azure Cosmos DB. Revoking access by removing the key from the dedicated Log Analytics cluster, or by removing the identity associated with the dedicated Log Analytics cluster is not supported.
117+
Access to the data can be revoked by disabling the customer-managed key in the key vault, or deleting the access policy to the key, for both the dedicated Log Analytics cluster and Azure Cosmos DB. Revoking access by removing the key from the dedicated Log Analytics cluster, or by removing the identity associated with the dedicated Log Analytics cluster isn't supported.
113118

114119
To understand more about how this works in Azure Monitor, see [Azure Monitor CMK revocation](../azure-monitor/logs/customer-managed-keys.md#key-revocation).
115120

@@ -127,7 +132,7 @@ After rotating a key, you must explicitly update the dedicated Log Analytics clu
127132

128133
## Replacing a customer-managed key
129134

130-
Microsoft Sentinel does not support replacing a customer-managed key. You should use the [key rotation capability](#customer-managed-key-rotation) instead.
135+
Microsoft Sentinel doesn't support replacing a customer-managed key. You should use the [key rotation capability](#customer-managed-key-rotation) instead.
131136

132137
## Next steps
133138
In this document, you learned how to set up a customer-managed key in Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:

0 commit comments

Comments
 (0)