You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/confidential-vm-backup.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,14 +25,13 @@ This article describes how to configure and back up Confidential VM (CVM) with P
25
25
26
26
Before you configure backup for CVM with CMK, ensure that the following prerequisites are met:
27
27
28
-
- Register for the preview feature `RestorePointSupportForConfidentialVMV2` under the `Microsoft.Compute` provider namespace by running the following cmdlet, which is auto‑approved.
28
+
- Register for the preview feature `RestorePointSupportForConfidentialVMV2` under the `Microsoft.Compute` provider namespace by running the following cmdlet. The registration is autoapproved.
- Identify or create a Confidential VM (CVM) in a supported region. See the [supported regions](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=virtual-machines).
37
36
- Identify or [create a Recovery Services Vault](backup-create-recovery-services-vault.md#create-a-recovery-services-vault) in the same region as the VM.
Copy file name to clipboardExpand all lines: articles/backup/confidential-vm-restore.md
+46-37Lines changed: 46 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Backup - Restore Confidential VM using Azure Backup (preview)
3
3
description: Learn about restoring Confidential VM with Platform Managed Key (PMK) or Customer Managed Key (CMK) using Azure Backup.
4
4
ms.topic: how-to
5
-
ms.date: 01/28/2026
5
+
ms.date: 02/03/2026
6
6
ms.custom: references_regions
7
7
ms.service: azure-backup
8
8
author: AbhishekMallick-MS
@@ -17,54 +17,40 @@ This article describes how to restore Confidential VM (CVM) encrypted with Platf
17
17
18
18
Learn about the [supported scenarios for Confidential VM backup](backup-support-matrix-iaas.md#support-for-confidential-vm-backup-preview).
19
19
20
-
## Restore scenarios for Confidential VM
20
+
## Prerequisites
21
+
22
+
Before you start the Confidential VM restore process, ensure you have the recovery points available in the Recovery Services vault.
23
+
24
+
## Restore scenarios for a Confidential VM
21
25
22
26
Confidential VM restore behavior depends on the state of the DES, Key Vault, and keys at the time of restore. Key restore scenarios include:
23
27
24
28
-**Original Key or Key Version intact**: Restore succeeds if the original Disk Encryption Set (DES) and key remain intact.
25
29
-**Key Rotation**: Restore succeeds when a new key version is active, provided the previous key version isn't expired or deleted.
26
-
-**Key Change**: If the DES uses a new key, restore succeeds only if the previous keystill exists; it fails if the previous key is deleted.
30
+
-**Key Change**: If the DES uses a new key in the same key vault, restore succeeds only if the original key, used during backup still exists. It fails if the original key is deleted. If you're using a different key vault - it should point to the same key as the original one.
27
31
-**DES or Key Deleted**: Restore fails with errors, such as `UserErrorDiskEncryptionSetDoesNotExist` or `UserErrorDiskEncryptionSetKeyDoesNotExist`. To resolve, re-create the key and DES using restored key data, then retry the restore.
28
-
-**Input DES Provided**: If you provide a new DES created from restored key data, restore can succeed if the key and version match the ones used at backup time.
32
+
-**Input DES Provided**: If you provide a new DES created from restored key data, restore succeeds if the key and version match the ones used at backup time.
29
33
-**Mismatched DES or Key**: Restore fails with `UserErrorInputDESKeyDoesNotMatchWithOriginalKey`. To resolve this error, restore the missing keys.
30
34
31
35
Learn how to [restore missing keys for Confidential VM restore](#restore-missing-keys-for-confidential-vm-restore).
32
36
33
-
## Prerequisites
34
-
35
-
Before you start the Confidential VM restore process, ensure you have the recovery points available in the Recovery Services vault.
36
-
37
-
## Assign permissions to DES and Confidential Guest VM Agent for restore
38
-
39
-
Disk Encryption Set and Confidential Guest VM Agent need permissions on the Key Vault or Managed HSM. To provide the permissions, follow these steps:
37
+
## Restore a Confidential VM
40
38
41
-
**For Key vault**: To grant permissions to the Key vault, select the message *To associate a disk, image, or snapshot with this disk encryption set, you must grant permissions to the key vault*.
39
+
### Restore with original key intact
40
+
During the restore process, you can continue without providing a Disk encryption set input when the original Customer Managed Key (CMK), Key Vault, mHSM, and DES are available. In these scenarios, you can continue the restore process as usual. [Learn how to restore an Azure VM](backup-azure-arm-restore-vms.md).
42
41
43
-
**For Managed HSM**: To grant permissions to the Managed HSM, follow these steps:
44
-
45
-
1. Assign newly created DES with the Managed HSM Crypto User Role:
42
+
### Restore when original key is rotated, lost, or compromised
43
+
The restore process fails if the original CMK, Key Vault, mHSM, or DES referencing the CMK is unavailable, or if backup can't access the original CMK. In such cases, the initial restore attempt fails, and the CVM won't restore. To address this, follow these steps:
44
+
1. Trigger the first restore operation without providing the disk encryption set input. This attempt fails due to the missing key, but it results in the key being restored in the storage account.
45
+
1. After this process, restore the Customer Managed Key that was backed up by Azure Backup, then create a new DES that points to the recovered key. Learn how to [restore missing keys](#restore-missing-keys-for-confidential-vm-restore) and [assign required permissions](#assign-permissions-to-des-and-confidential-guest-vm-agent-for-restore).
46
+
1. Initiate the restore operation again on the Restore page, this time entering the appropriate Disk Encryption Set.
46
47
47
-
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
48
-
2. To add a new Role Assignment, select **Add**.
49
-
3. Under **Role**, select **Managed HSM Crypto User Role**.
50
-
4. Under **Scope**, select the restored key. You can also select **All Keys**.
51
-
5. On the **Security principal**, select *newly created DES*.
52
-
53
-
2. Assign required permissions to the Confidential Guest VM Agent for booting up CVM:
54
-
55
-
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
56
-
2. To add a new Role Assignment, select **Add**.
57
-
3. Under **Role**, select **Managed HSM Crypto Service Encryption User**.
58
-
4. Under **Scope**, select the restored key. You can also select **All Keys**.
59
-
5. On the **Security principal**, select **Confidential Guest VM Agent**.
60
-
61
-
## Restore the Confidential VM
62
-
63
-
After you assign the required permissions, you can run the restore operation. [Learn how to restore an Azure VM](backup-azure-arm-restore-vms.md).
48
+
> [!NOTE]
49
+
> Restoring from a different DES - even if it uses the correct key - isn't currently supported from the snapshot-only tier restore points.
64
50
65
51
## Restore missing keys for Confidential VM restore
66
52
67
-
If the restore operation fails, you need to restore the PMK or CMK that Azure Backup backed up.
53
+
If the restore operation fails, you need to restore the keys that Azure Backup backed up.
68
54
69
55
To restore the key using PowerShell, follow these steps:
70
56
@@ -74,15 +60,12 @@ To restore the key using PowerShell, follow these steps:
2. To list all failed restore jobs from the last 7 days, run the following cmdlet:
63
+
2. To list all failed restore jobs from the last seven days, run the following cmdlet. If you want to fetch older jobs, update the day range in the cmdlet.
>If you want to fetch older jobs, update the day range in the cmdlet.
85
-
86
69
3. To select the failed restore job from the result and get the job details, run the following cmdlet:
87
70
88
71
*Example*
@@ -132,6 +115,32 @@ To restore the key using PowerShell, follow these steps:
132
115
133
116
Now, you can create a new DES with Encryption type as *Confidential disk encryption with CMK*, which should point to the restored key. This DES should have enough permissions to perform a successful restore. If you use a new Key Vault or Managed HSM to restore the key, then *Backup Management Service* has enough permissions on it. [Learn how to grant permission for Key Vault or Managed HSM access](confidential-vm-backup.md#assign-permissions-for-confidential-vm-backup).
134
117
118
+
## Assign permissions to DES and Confidential Guest VM Agent for restore
119
+
120
+
Disk Encryption Set and Confidential Guest VM Agent need permissions on the Key Vault or Managed HSM. To provide the permissions, follow these steps:
121
+
122
+
**For Key vault**: To grant permissions to the Key vault, you can follow [these steps in the documentation](/azure/key-vault/general/assign-access-policy?tabs=azure-portal) or follow these steps:
123
+
1. Navigate to the Disk encryption set instance.
124
+
1. Select the message *To associate a disk, image, or snapshot with this disk encryption set, you must grant permissions to the key vault* and grant permissions.
125
+
126
+
**For Managed HSM**: To grant permissions to the Managed HSM, follow these steps:
127
+
128
+
1. Assign newly created DES with the Managed HSM Crypto User Role:
129
+
130
+
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
131
+
2. To add a new Role Assignment, select **Add**.
132
+
3. Under **Role**, select **Managed HSM Crypto User Role**.
133
+
4. Under **Scope**, select the restored key. You can also select **All Keys**.
134
+
5. On the **Security principal**, select *newly created DES*.
135
+
136
+
2. Assign required permissions to the Confidential Guest VM Agent for booting up CVM:
137
+
138
+
1. In the [Azure portal](https://portal.azure.com/), go to **Managed HSM** > **Settings**, and then select **Local RBAC**.
139
+
2. To add a new Role Assignment, select **Add**.
140
+
3. Under **Role**, select **Managed HSM Crypto Service Encryption User**.
141
+
4. Under **Scope**, select the restored key. You can also select **All Keys**.
142
+
5. On the **Security principal**, select **Confidential Guest VM Agent**.
143
+
135
144
## Related content
136
145
137
146
-[Support matrix for Confidential VM backup](backup-support-matrix-iaas.md#support-for-confidential-vm-backup-preview).
| Region availability | Supported in UAE North, Korea Central. |
16
-
| Key rotation for backups | When key rotation occurs on a confidential virtual machine, the keys for the VM disks, related restore points, and snapshots update automatically. <br><br> Note that the key rotation in this preview release might fail due to the following scenarios: <br><br> - A large number of disks are linked to a single Disk Encryption Set (DES), including their restore points and snapshots. <br> - More than 40 disks are attached to one DES when only restore points are associated with these disks. <br> - Both restore points and snapshots are present for disks connected to the same DES, which lowers the safe threshold of 40 disks. <br> - Performance limitations during key rotation when multiple disks share one DES. <br><br> Recommendation: Keep the number of disks connected to each DES to a minimum until the issue is resolved. |
17
-
| Backup capabilities | - You can backup Confidential VMs with OS disk encryption only. <br> - Backup and restore fail if the CVM v2 opt-out feature flag is enabled for your subscription. <br> - Multi-disk crash consistent backup is unsupported. <br> - Cross Region Restore is currently unsupported as CVM v6 SKU isn't generally available in Azure paired regions. |
16
+
| Key rotation for backups | When key rotation occurs on a confidential virtual machine, the keys for the VM disks, related restore points, and snapshots update automatically. <br><br> **Known issue:** The key rotation in this *preview release* might have performance issues or fail in the following scenarios: <br> - More than 40 disks are attached to one DES when (only) restore points are associated with these disks. <br> - If you also directly create disk snapshots outside of Azure backup for these disks connected to the same DES, this lowers the safe threshold of 40 disks to DES mapping. <br><br> **Recommendation**: Keep the number of disks connected to each DES to a minimum until the issue is resolved. |
17
+
| Backup capabilities | - You can backup Confidential VMs with OS disk encryption only. <br> - Backup and restore fail if the CVM v2 opt-out feature flag is enabled for your subscription. <br> - Multi-disk crash consistent backup is unsupported. <br> - Cross Region Restore is currently unsupported as CVM v6 VM size isn't generally available in Azure paired regions. |
0 commit comments