Skip to content

Commit 4a32411

Browse files
committed
Merge branch 'WI538961-ai-model-security' of https://github.com/ElazarK/azure-security-docs-pr; branch 'main' of https://github.com/MicrosoftDocs/azure-security-docs-pr into WI538961-ai-model-security
2 parents 5b57524 + 2bf6f67 commit 4a32411

54 files changed

Lines changed: 776 additions & 471 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/attestation/tpm-attestation-sample-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ c:[type=="srtmDrtmEventPcr", issuer=="AttestationPolicy"] => add(type="Bitlocker
7171
[type=="BitlockerStatus", issuer=="AttestationPolicy"] => issue(type="BitlockerStatus", value=true);
7272
![type=="BitlockerStatus", issuer=="AttestationPolicy"] => issue(type="BitlockerStatus", value=false);
7373
74-
// Elam Driver (windows defender) Loaded
74+
// Elam Driver (Microsoft Defender) Loaded
7575
c:[type=="boolProperties", issuer=="AttestationPolicy"] => add(type="elamDriverLoaded", value=JsonToClaimValue(JmesPath(c.value, "[*].EVENT_LOADEDMODULE_AGGREGATION[] | [? EVENT_IMAGEVALIDATED == `true` && (equals_ignore_case(EVENT_FILEPATH, '\\windows\\system32\\drivers\\wdboot.sys') || equals_ignore_case(EVENT_FILEPATH, '\\windows\\system32\\drivers\\wd\\wdboot.sys'))] | @ != `null`")));
7676
[type=="elamDriverLoaded", issuer=="AttestationPolicy"] => issue(type="ELAMDriverLoaded", value=true);
7777
![type=="elamDriverLoaded", issuer=="AttestationPolicy"] => issue(type="ELAMDriverLoaded", value=false);

articles/confidential-ledger/manage-azure-ad-token-based-users.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ ledger_client = ConfidentialLedgerClient(
5555

5656
# Add a user with the contributor role
5757
# Other supported roles are Contributor and Administrator
58-
user_id = "Azure AD object id of the user"
58+
user_id = "Microsoft Entra ID object id of the user"
5959
user = ledger_client.create_or_update_user(
6060
user_id, {"assignedRole": "Contributor"}
6161
)
@@ -98,7 +98,7 @@ internal class ACLUserManagement
9898
// The DefaultAzureCredential will use the current Azure context to authenticate to Azure
9999
var ledgerClient = new ConfidentialLedgerClient(new Uri("https://contoso.confidential-ledger.azure.com"), new DefaultAzureCredential());
100100
101-
string userId = "Azure AD object id of the user";
101+
string userId = "Microsoft Entra ID object id of the user";
102102
103103
// Add the user with the Reader role
104104
// Other supported roles are Contributor and Administrator
@@ -206,7 +206,7 @@ public class CreateOrUpdateUserSample {
206206
// Other supported roles are Contributor and Administrator
207207
BinaryData userDetails = BinaryData.fromString("{\"assignedRole\":\"Reader\"}");
208208
RequestOptions requestOptions = new RequestOptions();
209-
String userId = "Azure AD object id of the user";
209+
String userId = "Microsoft Entra ID object id of the user";
210210
Response<BinaryData> response = confidentialLedgerClient.createOrUpdateUserWithResponse(userId,
211211
userDetails, requestOptions);
212212

@@ -277,8 +277,8 @@ export async function main() {
277277
new DefaultAzureCredential()
278278
);
279279

280-
// Azure AD object id of the user
281-
const userId = "Azure AD Object id"
280+
// Microsoft Entra ID object id of the user
281+
const userId = "Microsoft Entra ID Object id"
282282

283283
// Other supported roles are Reader and Contributor
284284
const createUserParams: CreateOrUpdateUserParameters = {

articles/confidential-ledger/quickstart-template.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create an Microsoft Azure confidential ledger by using Azure Resource Manager template
3-
description: Learn how to create an Microsoft Azure confidential ledger by using Azure Resource Manager template.
2+
title: Create a Microsoft Azure confidential ledger by using Azure Resource Manager template
3+
description: Learn how to create a Microsoft Azure confidential ledger by using Azure Resource Manager template.
44
services: azure-resource-manager
55
author: msmbaldwin
66
ms.service: azure-confidential-ledger
@@ -10,7 +10,7 @@ ms.author: mbaldwin
1010
ms.date: 04/14/2025
1111
---
1212

13-
# Quickstart: Create an Microsoft Azure confidential ledger with an ARM template
13+
# Quickstart: Create a Microsoft Azure confidential ledger with an ARM template
1414

1515
[Microsoft Azure confidential ledger](overview.md) is a new and highly secure service for managing sensitive data records. This quickstart describes how to use an Azure Resource Manager template (ARM template) to create a new ledger.
1616

articles/confidential-ledger/quickstart-terraform.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In this quickstart, you create an Azure resource group and a confidential ledger
2424
> * Retrieve the current Azure client configuration.
2525
> * Generate a random string for the Azure confidential ledger name.
2626
> * Create an Azure confidential ledger with the generated name and assign it to the resource group.
27-
> * Assign an Azure AD based service principal to the confidential ledger.
27+
> * Assign a Microsoft Entra ID based service principal to the confidential ledger.
2828
> * Tag the confidential ledger as an example.
2929
> * Output the resource group name, confidential ledger name, confidential ledger type, and confidential ledger role name.
3030
> * Specify the required version of Terraform and the required providers.

articles/dedicated-hsm/monitoring.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,24 @@ The monitor function itself is set up to poll the device every 10 minutes to get
2525

2626
Depending on the nature of the issue, the appropriate course of action would be taken to reduce impact and ensure low risk remediation. For example, a power supply failure is a hot-swap procedure with no resultant tamper event so can be performed with low impact and minimal risk to operation. Other procedures may require a device to be zeroized and deprovisioned to minimize any security risk to the customer. In this situation a customer would provision an alternate device, rejoin a high availability pairing thus triggering device synchronization. Normal operation would resume in minimal time, with minimal disruption and lowest security risk.
2727

28+
### Power supply redundancy
29+
30+
The Thales Luna 7 HSM device uses a dual power supply unit (PSU) design for redundancy. Each PSU connects to an independent power feed, allowing the device to operate normally if one PSU experiences a brief outage.
31+
32+
During scheduled datacenter power maintenance, power feeds are serviced one at a time while the other feed remains active, ensuring continuous operation through redundant power. You may see transient single-PSU messages in your HSM logs such as:
33+
34+
```text
35+
Power supply 1 AC outage
36+
Power supply 1 AC restored
37+
```
38+
39+
These messages are expected behavior and don't indicate a hardware fault—the device continues operating normally on the redundant PSU.
40+
41+
> [!IMPORTANT]
42+
> Don't open support tickets or request physical hardware investigation based on single-PSU log messages. Microsoft monitors PSU health and proactively addresses any actual hardware failures. Unnecessary physical intervention can introduce risk to your device's operation.
43+
44+
If our monitoring detects a genuine PSU or fan issue, Microsoft replaces the component without requiring customer action or notification.
45+
2846
## Customer monitoring
2947

3048
A value proposition of the Dedicated HSM service is the control the customer gets of the device, especially considering it is a cloud delivered device. A consequence of this control is the responsibility to monitor and manage the health of the device.

articles/dedicated-hsm/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Azure Dedicated HSM is most suitable for “lift-and-shift” scenarios that req
6565

6666
### Not a fit
6767

68-
Azure Dedicated HSM is not a good fit for the following type of scenario: Microsoft cloud services that support encryption with customer-managed keys (such as Azure Information Protection, Azure Disk Encryption, Azure Data Lake Store, Azure Storage, Azure SQL Database, and Customer Key for Office 365) that are not integrated with Azure Dedicated HSM.
68+
Azure Dedicated HSM is not a good fit for the following type of scenario: Microsoft cloud services that support encryption with customer-managed keys (such as Azure Information Protection, Azure Disk Encryption, Azure Data Lake Store, Azure Storage, Azure SQL Database, and Customer Key for Microsoft 365) that are not integrated with Azure Dedicated HSM.
6969

7070
> [!NOTE]
7171
> Customers must have an assigned Microsoft Account Manager and meet the monetary requirement of five million ($5M) USD or greater in overall committed Azure revenue annually to qualify for onboarding and use of Azure Dedicated HSM.

0 commit comments

Comments
 (0)