Skip to content

Commit 2f4b206

Browse files
Merge pull request #2766 from msmbaldwin/msrc-113198-dedup-compromise-steps
Deduplicate key compromise response steps in secure-keys.md
2 parents 0b1e4e7 + 9fbbdd5 commit 2f4b206

1 file changed

Lines changed: 3 additions & 9 deletions

File tree

articles/key-vault/keys/secure-keys.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: azure-key-vault
66
ms.subservice: keys
77
ms.topic: best-practice
88
ms.custom: horz-security
9-
ms.date: 04/20/2026
9+
ms.date: 04/21/2026
1010
ms.author: mbaldwin
1111
ai-usage: ai-assisted
1212
# Customer intent: As a developer using Key Vault keys, I want to implement key-specific security best practices.
@@ -65,15 +65,9 @@ Protect against data loss by implementing proper backup and recovery procedures:
6565

6666
## Key compromise response
6767

68-
If you suspect a key has been compromised (for example, through unauthorized backup and restore to another vault), do not immediately disable or delete the key. A restored copy of a key is fully independent of the source vault: disabling, deleting, or purging the original key does not invalidate any restored copies. Meanwhile, disabling or deleting the key immediately takes all dependent services offline (Azure SQL TDE, Azure Storage SSE, Azure Disk Encryption, and others). For full details on backup copy independence, see [Backup security considerations](../general/backup.md#security-considerations).
68+
If you suspect a key has been compromised (for example, through unauthorized backup and restore to another vault), do not immediately disable or delete the key. A restored copy is fully independent of the source vault, so disabling, deleting, or purging the original does not invalidate any restored copies. At the same time, disabling or deleting the key takes all dependent services offline (Azure SQL TDE, Azure Storage SSE, Azure Disk Encryption, and others).
6969

70-
Follow this incident response sequence:
71-
72-
1. **Contain the breach**: Immediately review and revoke any principals with backup or restore permissions on the compromised vault. Investigate Key Vault audit logs for unauthorized backup and restore activity.
73-
1. **Create a replacement key**: Create a new key (not a new version of the compromised key) in a separate vault with tightly restricted access.
74-
1. **Re-wrap data encryption keys**: Reconfigure all dependent services to use the replacement key. Each service re-wraps its data encryption keys with the new key. See [Configure cryptographic key autorotation in Azure Key Vault](how-to-configure-key-rotation.md) for rotation procedures.
75-
1. **Verify service health**: Confirm that all dependent services are operating normally with the replacement key.
76-
1. **Disable the compromised key**: Only after all services have migrated, disable the old key. If purge protection is enabled, the key can't be permanently purged until the retention period expires, so leave it disabled until then.
70+
Instead, contain the breach, rotate to a new key in a clean vault, migrate all dependent services, and only then disable the compromised key. For the full step-by-step incident response procedure, see [Backup security considerations](../general/backup.md#security-considerations). For key rotation procedures, see [Configure cryptographic key autorotation in Azure Key Vault](how-to-configure-key-rotation.md).
7771

7872
To detect unauthorized key exfiltration early, monitor Key Vault audit logs for `KeyBackup` and `KeyRestore` operations and alert on unexpected activity. For more information, see [Azure Key Vault logging](../general/logging.md).
7973

0 commit comments

Comments
 (0)