You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#Customer intent: As an Azure Key Vault administrator, I want to back up a secret, key, or certificate in my key vault.
13
13
---
@@ -54,6 +54,24 @@ Also consider the following issues:
54
54
55
55
When you back up a key vault object, such as a secret, key, or certificate, the backup operation will download the object as an encrypted blob. This blob can't be decrypted outside of Azure. To get usable data from this blob, you must restore the blob into a key vault within the same Azure subscription and [Azure geography](https://azure.microsoft.com/global-infrastructure/geographies/).
56
56
57
+
## Security considerations
58
+
59
+
When you restore a key to a different vault, the restored copy is fully independent of the original. Disabling, deleting, or purging the original key has no effect on any restored copies. They remain fully functional in their respective vaults. There is no mechanism in Azure Key Vault to revoke or invalidate a previously created backup blob or a key that has already been restored to another vault.
60
+
61
+
This independence has important implications for incident response. If you suspect a key has been compromised through unauthorized backup and restore, do not immediately disable or delete the key. Doing so takes all dependent services offline (for example, Azure SQL TDE databases become inaccessible, Azure Storage with customer-managed keys returns errors, and Azure Disk Encryption–protected VMs can't start) but does not affect any copies an attacker may have restored to another vault.
62
+
63
+
Instead, follow this incident response sequence:
64
+
65
+
1.**Contain the breach**: Immediately review and revoke any principals with backup or restore permissions on the compromised vault. Investigate Key Vault audit logs for unauthorized backup and restore activity to understand the scope of the compromise.
66
+
1.**Create a replacement key** in a separate vault with tightly restricted access. Use a new key (not a new version of the compromised key) to ensure the replacement can't be obtained from existing backup blobs.
67
+
1.**Reconfigure dependent services** to use the replacement key (each service re-wraps its data encryption keys with the new key).
68
+
1.**Verify** that all dependent services are operating normally with the replacement key.
69
+
1.**Disable the compromised key** only after dependent services are fully migrated. If purge protection is enabled on the vault, the key can't be permanently purged until the retention period expires, so leave it disabled until then.
70
+
71
+
To reduce the risk of unauthorized backup exfiltration, restrict backup and restore permissions to only the identities that genuinely require them. Monitor your Key Vault audit logs for `KeyBackup`, `KeyRestore`, `SecretBackup`, `SecretRestore`, `CertificateBackup`, and `CertificateRestore` operations and alert on unexpected activity. For more information, see [Azure Key Vault logging](logging.md).
72
+
73
+
For key-specific security best practices and key compromise response procedures, see [Secure your Azure Key Vault keys](../keys/secure-keys.md#key-compromise-response).
Copy file name to clipboardExpand all lines: articles/key-vault/general/secure-key-vault.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
7
7
ms.subservice: general
8
8
ms.custom: horz-security
9
9
ms.topic: best-practice
10
-
ms.date: 01/30/2026
10
+
ms.date: 04/20/2026
11
11
ms.author: mbaldwin
12
12
ai-usage: ai-assisted
13
13
#CustomerIntent: As a key vault administrator, I want to learn how to secure my key vaults
@@ -125,6 +125,8 @@ Regular backups ensure business continuity and protect against data loss from ac
125
125
126
126
-**Test backup and recovery procedures**: To verify the effectiveness of backup processes, regularly test the restoration of Key Vault secrets, keys, and certificates. See [Azure Key Vault backup](backup.md).
127
127
128
+
-**Understand backup copy independence**: A key restored from a backup to another vault is fully independent of the original. Disabling, deleting, or purging the original key does not affect any restored copies. Disabling or deleting the key also takes all dependent data services offline (for example, SQL TDE databases become inaccessible and Storage accounts with customer-managed keys return errors). If a key is suspected compromised, rotate to a new key and migrate dependent services before disabling the old one. For full details, see [Backup security considerations](backup.md#security-considerations) and [Key compromise response](../keys/secure-keys.md#key-compromise-response).
129
+
128
130
## Related security articles
129
131
130
132
For security best practices specific to keys, secrets, and certificates, see:
Copy file name to clipboardExpand all lines: articles/key-vault/keys/secure-keys.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: azure-key-vault
6
6
ms.subservice: keys
7
7
ms.topic: best-practice
8
8
ms.custom: horz-security
9
-
ms.date: 04/10/2026
9
+
ms.date: 04/20/2026
10
10
ms.author: mbaldwin
11
11
ai-usage: ai-assisted
12
12
# Customer intent: As a developer using Key Vault keys, I want to implement key-specific security best practices.
@@ -60,8 +60,23 @@ Protect against data loss by implementing proper backup and recovery procedures:
60
60
-**Enable soft delete**: Soft delete allows recovery of deleted keys within a retention period (7-90 days). See [Azure Key Vault soft-delete overview](../general/soft-delete-overview.md)
61
61
-**Enable purge protection**: Prevent permanent deletion of keys during the retention period. See [Purge protection](../general/soft-delete-overview.md#purge-protection)
62
62
-**Back up critical keys**: Export and securely store backups of keys that protect irreplaceable data. See [Azure Key Vault backup](../general/backup.md)
63
+
-**Restrict backup permissions**: Grant the `backup` key operation only to identities that genuinely need it. A backed-up key that is restored to another vault becomes fully independent of the original. See [Backup security considerations](../general/backup.md#security-considerations) for details.
63
64
-**Document recovery procedures**: Maintain runbooks for key recovery scenarios
64
65
66
+
## Key compromise response
67
+
68
+
If you suspect a key has been compromised (for example, through unauthorized backup and restore to another vault), do not immediately disable or delete the key. A restored copy of a key is fully independent of the source vault: disabling, deleting, or purging the original key does not invalidate any restored copies. Meanwhile, disabling or deleting the key immediately takes all dependent services offline (Azure SQL TDE, Azure Storage SSE, Azure Disk Encryption, and others). For full details on backup copy independence, see [Backup security considerations](../general/backup.md#security-considerations).
69
+
70
+
Follow this incident response sequence:
71
+
72
+
1.**Contain the breach**: Immediately review and revoke any principals with backup or restore permissions on the compromised vault. Investigate Key Vault audit logs for unauthorized backup and restore activity.
73
+
1.**Create a replacement key**: Create a new key (not a new version of the compromised key) in a separate vault with tightly restricted access.
74
+
1.**Re-wrap data encryption keys**: Reconfigure all dependent services to use the replacement key. Each service re-wraps its data encryption keys with the new key. See [Configure cryptographic key autorotation in Azure Key Vault](how-to-configure-key-rotation.md) for rotation procedures.
75
+
1.**Verify service health**: Confirm that all dependent services are operating normally with the replacement key.
76
+
1.**Disable the compromised key**: Only after all services have migrated, disable the old key. If purge protection is enabled, the key can't be permanently purged until the retention period expires, so leave it disabled until then.
77
+
78
+
To detect unauthorized key exfiltration early, monitor Key Vault audit logs for `KeyBackup` and `KeyRestore` operations and alert on unexpected activity. For more information, see [Azure Key Vault logging](../general/logging.md).
79
+
65
80
## Bring Your Own Key (BYOK)
66
81
67
82
When importing your own keys into Key Vault, follow security best practices:
0 commit comments