Skip to content

Commit b11a8d4

Browse files
authored
Merge pull request #260393 from shellyhaverkamp/smh-dicom-cmk
Final DICOM CMK PR
2 parents ebe0f98 + 7a44de4 commit b11a8d4

17 files changed

Lines changed: 377 additions & 4 deletions

articles/healthcare-apis/dicom/configure-customer-managed-keys.md

Lines changed: 329 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Best practices for customer-managed keys for the DICOM service in Azure Health Data Services
3+
description: Encrypt your data with customer-managed keys (CMK) in the DICOM service in Azure Health Data Services. Get tips on requirements, best practices, limitations, and troubleshooting.
4+
author: mmitrik
5+
ms.service: healthcare-apis
6+
ms.subservice: fhir
7+
ms.topic: overview
8+
ms.date: 11/20/2023
9+
ms.author: mmitrik
10+
---
11+
12+
# Best practices for using customer-managed keys for the DICOM service
13+
14+
Customer-managed keys (CMK) are encryption keys that you create and manage in your own key store. By using CMK, you can have more flexibility and control over the encryption and access of your organization’s data. You use [Azure Key Vault](../../key-vault/index.yml) to create and manage CMK and then use the keys to encrypt the data stored by the DICOM® service.
15+
16+
## Rotate keys often
17+
18+
Follow [security best practices](../../key-vault/secrets/secrets-best-practices.md) and rotate keys often. Keys used with the DICOM service must be rotated manually. To rotate a key, update the version of the existing key or set a new encryption key from a different storage location. Always make sure to keep existing keys enabled when adding new keys because they're still needed to access the data that was encrypted with them.
19+
20+
## Update the DICOM service after changing a managed identity
21+
22+
If you change the managed identity in any way, such as moving your DICOM service to a different tenant or subscription, the DICOM service isn't able to access your keys until you update the service manually with an ARM template deployment. For steps, see [Use an ARM template to update the encryption key](configure-customer-managed-keys.md#update-the-key-by-using-an-arm-template).
23+
24+
## Locate the key vault in the same tenant
25+
26+
The key vault must be located in the same Azure tenant as your DICOM service.
27+
28+
## Disable public access with a firewall
29+
30+
When using a key vault with a firewall to disable public access, the option to **Allow trusted Microsoft services to bypass this firewall** must be enabled.
31+
32+
## Next steps
33+
34+
[Configure customer-managed keys for the DICOM service](configure-customer-managed-keys.md)
35+
36+
[!INCLUDE [DICOM trademark statement](../includes/healthcare-apis-dicom-trademark.md)]

articles/healthcare-apis/dicom/import-files.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,13 @@ Before you perform a bulk import, you need to enable a system-assigned managed i
2828

2929
1. In the Azure portal, go to the DICOM instance and then select **Identity** from the left pane.
3030

31-
1. On the **Identity** page, select the **System assigned** tab, and then set the **Status** field to **On**. Select **Save**.
31+
2. On the **Identity** page, select the **System assigned** tab.
32+
33+
3. In the **Status** field, select **On**.
3234

33-
:::image type="content" source="media/system-assigned-managed-identity.png" alt-text="Screenshot that shows the system-assigned managed identity toggle on the Identity page." lightbox="media/system-assigned-managed-identity.png":::
35+
4. Choose **Save**.
36+
37+
:::image type="content" source="media/configure-customer-managed-keys/system-assigned-managed-identity.png" alt-text="Screenshot showing the system assigned managed identity toggle on the Identity page." lightbox="media/configure-customer-managed-keys/system-assigned-managed-identity.png":::
3438

3539
## Enable bulk import
3640

913 KB
Loading
152 KB
Loading
666 KB
Loading
607 KB
Loading
1.25 MB
Loading
1.67 MB
Loading
855 KB
Loading

0 commit comments

Comments
 (0)