Skip to content

Commit 6abc6e1

Browse files
Merge pull request #314532 from msmbaldwin/cmk-qanda
Add operational key protection note to envelope encryption section
2 parents 25fa0d5 + d27f7ea commit 6abc6e1

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

articles/security/fundamentals/encryption-atrest.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,9 @@ ms.assetid: 9dcb190e-e534-4787-bf82-8ce73bf47dba
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 04/02/2026
11+
ms.date: 04/09/2026
1212
ms.author: mbaldwin
13+
ai-usage: ai-assisted
1314

1415
---
1516

@@ -79,6 +80,8 @@ You use more than one encryption key in an encryption at rest implementation. St
7980

8081
Resource providers and application instances store the encrypted Data Encryption Keys as metadata. Only an entity with access to the Key Encryption Key can decrypt these Data Encryption Keys. Different models of key storage are supported. For more information, see [data encryption models](encryption-models.md).
8182

83+
When services cache DEKs locally for active cryptographic operations, the cached keys are protected by Azure platform security controls, including [host-level compute isolation](isolation-choices.md) and process-level protections. Cached operational keys are an availability and performance mechanism — the KEK in Key Vault remains the root of trust, and key revocation governs access to encrypted data.
84+
8285
## Encryption at rest in Microsoft cloud services
8386

8487
You use Microsoft Cloud services in all three cloud models: IaaS, PaaS, and SaaS. The following examples show how they fit in each model:

0 commit comments

Comments
 (0)