Skip to content

Commit d27f7ea

Browse files
msmbaldwinCopilot
andcommitted
Add operational key protection note to envelope encryption section
Brief addition to encryption-at-rest envelope encryption section clarifying that cached DEKs are protected by Azure platform security controls and that the KEK in Key Vault remains the root of trust. Co-authored-by: Copilot <[email protected]>
1 parent c16ed08 commit d27f7ea

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

articles/security/fundamentals/encryption-atrest.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,9 @@ ms.assetid: 9dcb190e-e534-4787-bf82-8ce73bf47dba
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 04/02/2026
11+
ms.date: 04/09/2026
1212
ms.author: mbaldwin
13+
ai-usage: ai-assisted
1314

1415
---
1516

@@ -79,6 +80,8 @@ You use more than one encryption key in an encryption at rest implementation. St
7980

8081
Resource providers and application instances store the encrypted Data Encryption Keys as metadata. Only an entity with access to the Key Encryption Key can decrypt these Data Encryption Keys. Different models of key storage are supported. For more information, see [data encryption models](encryption-models.md).
8182

83+
When services cache DEKs locally for active cryptographic operations, the cached keys are protected by Azure platform security controls, including [host-level compute isolation](isolation-choices.md) and process-level protections. Cached operational keys are an availability and performance mechanism — the KEK in Key Vault remains the root of trust, and key revocation governs access to encrypted data.
84+
8285
## Encryption at rest in Microsoft cloud services
8386

8487
You use Microsoft Cloud services in all three cloud models: IaaS, PaaS, and SaaS. The following examples show how they fit in each model:

0 commit comments

Comments
 (0)