Skip to content

Commit 25be498

Browse files
msmbaldwinCopilot
andcommitted
Address Acrolinx feedback on mhsm-control-data and multi-region-replication
- Remove General Data Protection Regulation per MSFT GDPR content guidance - Replace third-party with non-Microsoft - Fix stray period in multi-region-replication.md - Update ms.date Co-authored-by: Copilot <[email protected]>
1 parent ad9437e commit 25be498

2 files changed

Lines changed: 6 additions & 6 deletions

File tree

articles/key-vault/managed-hsm/mhsm-control-data.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice: managed-hsm
66
ms.topic: concept-article
77
author: nkondamudi
88
ms.author: nkondamudi
9-
ms.date: 04/02/2026
9+
ms.date: 04/07/2026
1010
---
1111

1212
# Control your data in the cloud by using Managed HSM
@@ -17,7 +17,7 @@ In this article, we take a deep dive on [Azure Key Vault Managed HSM](./overview
1717

1818
Encryption is one of the key technical measures you can take to get sole control of your data. Azure fortifies your data through state-of-the-art encryption technologies, both for data at rest and for data in transit. Our encryption products erect barriers against unauthorized access to the data, including two or more independent encryption layers to protect against compromises of any single layer. In addition, Azure has clearly defined, well-established responses, policies and processes, strong contractual commitments, and strict physical, operational, and infrastructure security controls to provide our customers the ultimate control of their data in the cloud. The fundamental premise of Azure’s key management strategy is to give our customers more control over their data. We use a [zero trust](https://www.microsoft.com/security/business/zero-trust) posture with advanced enclave technologies, hardware security modules (HSMs), and identity isolation that reduces Microsoft access to customer keys and data.
1919

20-
*Encryption at rest* provides data protection for stored data at rest and as required by an organization's need for data governance and compliance efforts. Microsoft’s compliance portfolio is the broadest in all public clouds worldwide, with industry standards and government regulations such as [HIPAA](https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html), [General Data Protection Regulation](https://gdpr.eu/), and [Federal Information Processing Standards (FIPS) 140-2 and 3](https://csrc.nist.gov/publications/detail/fips/140/2/final). These standards and regulations lay out specific safeguards for data protection and encryption requirements. In most cases, a mandatory measure is required for compliance.
20+
*Encryption at rest* provides data protection for stored data at rest and as required by an organization's need for data governance and compliance efforts. Microsoft’s compliance portfolio is the broadest in all public clouds worldwide, with industry standards and government regulations such as [HIPAA](https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html) and [Federal Information Processing Standards (FIPS) 140-2 and 3](https://csrc.nist.gov/publications/detail/fips/140/2/final). These standards and regulations lay out specific safeguards for data protection and encryption requirements. In most cases, a mandatory measure is required for compliance.
2121

2222
## How does encryption at rest work?
2323

@@ -123,7 +123,7 @@ Several layers of technical controls in Managed HSM further protect your key mat
123123
- **Private endpoints**: By enabling a private endpoint, you're bringing the Managed HSM service into your virtual network allowing you to isolate that service only to trusted endpoints like your virtual network and Azure services. All traffic to and from your managed HSM will travel along the secure Microsoft backbone network without having to traverse the public internet.
124124
- **Monitoring and logging**: The outermost layer of protection is the monitoring and logging capabilities of Managed HSM. By using the Azure Monitor service, you can check your logs for analytics and alerts to ensure that access patterns conform with your expectations. This allows members of your security team to have visibility into what is happening within the Managed HSM service. If something doesn't look right, you can always roll your keys or revoke permissions.
125125
- **Bring your own key (BYOK)**: BYOK enables Azure customers to use any supported on-premises HSMs to generate keys, and then import them to the managed HSM. Some customers prefer to use on-premises HSMs to generate keys to meet regulatory and compliance requirements. Then, they use BYOK to securely transfer an HSM-protected key to the managed HSM. The key to be transferred never exists outside of an HSM in plaintext form. During the import process, the key material is protected with a key that's held in the managed HSM.
126-
- **External HSM**: Some customers have asked us if they can explore the option of having the HSM outside the Azure cloud to keep the data and keys segregated with an external HSM, either on a third-party cloud or on-premises. Although using a third-party HSM outside of Azure seems to give customers more control over keys, it introduces several concerns, such as latency that causes performance issues, SLA slip that's caused by issues with the third-party HSM, and maintenance and training costs. Also, a third-party HSM can't use key Azure features like soft delete and purge protection. We continue to evaluate this technical option with our customers to help them navigate the complex security and compliance landscape.
126+
- **External HSM**: Some customers have asked us if they can explore the option of having the HSM outside the Azure cloud to keep the data and keys segregated with an external HSM, either on a non-Microsoft cloud or on-premises. Although using a non-Microsoft HSM outside of Azure seems to give customers more control over keys, it introduces several concerns, such as latency that causes performance issues, SLA slip that's caused by issues with the non-Microsoft HSM, and maintenance and training costs. Also, a non-Microsoft HSM can't use key Azure features like soft delete and purge protection. We continue to evaluate this technical option with our customers to help them navigate the complex security and compliance landscape.
127127

128128
#### Administrative security controls
129129

@@ -140,7 +140,7 @@ These administrative security controls are in place in Azure Key Vault Managed H
140140
- **[Microsoft Security Response Center](https://www.microsoft.com/msrc) (MSRC)**. Managed HSM service administration is tightly integrated with MSRC.
141141
- Security monitoring for unexpected administrative operations with full 24/7 security response
142142
- **[Cloud resilient and secure supply chain](https://azure.microsoft.com/blog/advancing-reliability-through-a-resilient-cloud-supply-chain/)**. Managed HSM advances reliability through a resilient cloud supply chain.
143-
- **[Regulatory compliance built-in initiative](/azure/governance/policy/samples/built-in-initiatives#regulatory-compliance)**. Compliance in Azure Policy provides built-in initiative definitions to view a list of the controls and compliance domains based on responsibility (Customer, Microsoft, Shared). For Microsoft-responsible controls, we provide additional details of our audit results based on third-party attestation and our implementation details to achieve that compliance.
143+
- **[Regulatory compliance built-in initiative](/azure/governance/policy/samples/built-in-initiatives#regulatory-compliance)**. Compliance in Azure Policy provides built-in initiative definitions to view a list of the controls and compliance domains based on responsibility (Customer, Microsoft, Shared). For Microsoft-responsible controls, we provide additional details of our audit results based on non-Microsoft attestation and our implementation details to achieve that compliance.
144144
- **[Audit reports](https://servicetrust.microsoft.com/ViewPage/MSComplianceGuideV3)**. Resources to help information security and compliance professionals understand cloud features, and to verify technical compliance and control requirements
145145
- **Assume breach philosophy**. We assume that any component could be compromised at any time, and we design and test appropriately. We do regular Red Team/Blue Team exercises ([attack simulation](/compliance/assurance/assurance-monitoring-and-testing)).
146146

articles/key-vault/managed-hsm/multi-region-replication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: managed-hsm
88
ms.topic: tutorial
9-
ms.date: 04/02/2026
9+
ms.date: 04/07/2026
1010

1111
ms.author: nkondamudi
1212
ms.custom: references_regions
@@ -66,7 +66,7 @@ The [Managed HSM soft-delete feature](soft-delete-overview.md) allows recovery o
6666

6767
## Private link behavior with Multi-region replication
6868

69-
The [Azure Private Link feature](private-link.md) allows you to access the Managed HSM service over a private endpoint in your virtual network. You would configure private endpoint on the Managed HSM in the primary region just as you would when not using the multi-region replication feature. For the Managed HSM in an extended region, it is recommended to create another private endpoint and private DNS zone once the Managed HSM in the primary region is replicated to the Managed HSM in an extended region., which redirects client requests to the Managed HSM closest to the client location.
69+
The [Azure Private Link feature](private-link.md) allows you to access the Managed HSM service over a private endpoint in your virtual network. You would configure private endpoint on the Managed HSM in the primary region just as you would when not using the multi-region replication feature. For the Managed HSM in an extended region, it is recommended to create another private endpoint and private DNS zone once the Managed HSM in the primary region is replicated to the Managed HSM in an extended region, which redirects client requests to the Managed HSM closest to the client location.
7070

7171
Here are some scenarios with examples: Managed HSM in a primary region (UK South) and another Managed HSM in an extended region (US West Central).
7272

0 commit comments

Comments
 (0)