Skip to content

Commit 4d24d43

Browse files
Merge pull request #2711 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-09 17:07 UTC
2 parents a197bb7 + f1e5d61 commit 4d24d43

15 files changed

Lines changed: 1190 additions & 1201 deletions

.openpublishing.redirection.key-vault.json

Lines changed: 588 additions & 568 deletions
Large diffs are not rendered by default.

articles/cloud-hsm/secure-cloud-hsm.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn best practices for securing Azure Cloud HSM to help protect c
44
author: msmbaldwin
55
ms.service: azure-cloud-hsm
66
ms.topic: conceptual
7-
ms.date: 03/31/2026
7+
ms.date: 04/08/2026
88
ai-usage: ai-assisted
99
ms.custom: horz-security
1010
ms.author: mbaldwin
@@ -88,6 +88,8 @@ Proper handling of key storage limits, key wrapping security, key attributes, an
8888

8989
- **Configure operation event logging**: Operation event logging is vital for HSM security. It provides an immutable record of access and operations for accountability, traceability, and regulatory compliance. It helps detect unauthorized access, investigate incidents, and identify anomalies, to help ensure the integrity and confidentiality of cryptographic operations. To maintain security and privacy, logs exclude sensitive data (such as key IDs, key names, and user details). They capture HSM operations, timestamps, and metadata, but they can't determine success or failure because the HSM operation occurs within the inner TLS channel. See [Tutorial: Operation event logging in Azure Cloud HSM](tutorial-operation-event-logging.md).
9090

91+
- **Stream logs to Event Hub for real-time processing**: For real-time log processing and integration with downstream SIEM systems or custom analytics pipelines, configure Event Hub as an additional destination for your diagnostic settings. See [Tutorial: Configure Event Hub for Azure Cloud HSM](tutorial-configure-event-hub.md).
92+
9193
## Backup and recovery
9294

9395
Azure Cloud HSM provides high availability through clustered HSMs that synchronize keys and policies while automatically migrating workloads during failures.

articles/cloud-hsm/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ items:
1515
items:
1616
- name: Operation event logging
1717
href: tutorial-operation-event-logging.md
18+
- name: Configure Event Hub for logging
19+
href: tutorial-configure-event-hub.md
1820
- name: Backup and restore
1921
href: backup-restore.md
2022
- name: Certificate storage

articles/cloud-hsm/troubleshoot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: keithp
55
manager: davinune
66
ms.service: azure-cloud-hsm
77
ms.topic: troubleshooting-general
8-
ms.date: 03/26/2026
8+
ms.date: 04/08/2026
99
ms.author: keithp
1010
---
1111

@@ -406,15 +406,15 @@ ED25519 keys are typically used for self-signed certificates or in certificate s
406406

407407
### Can I use azcloudhsm_util to generate RSA and EC keys before using the Azure Cloud HSM OpenSSL engine to generate a CSR?
408408

409-
Yes. You can run the following `azcloudhsm_util` commands to create an RSA or EC key and then extract the private key to a fake PEM format. Replace `{PRIVATE_KEY_HANDLE}` with the private key handle of the RSA or EC key that you created.
409+
Yes. You can run the following `azcloudhsm_util` commands to create an RSA or EC key and then extract the private key to a fake PEM format. Replace `<private-key-handle>` with the private key handle of the RSA or EC key that you created.
410410

411411
The private key metadata file in PEM format doesn't contain any sensitive private key materials. The metadata identifies the private key, and only the OpenSSL engine for Azure Cloud HSM understands this file.
412412

413413
Use this command to create an RSA key:
414414

415415
```bash
416416
./azcloudhsm_util singlecmd loginHSM -u CU -p user1234 -s cu1 genRSAKeyPair -m 2048 -e 65537 -l labelRSATest
417-
./azcloudhsm_util singlecmd loginHSM -u CU -p user1234 -s cu1 getCaviumPrivKey -k {PRIVATE_KEY_HANDLE} -out web_server_fake_PEM.key
417+
./azcloudhsm_util singlecmd loginHSM -u CU -p user1234 -s cu1 getCaviumPrivKey -k <private-key-handle> -out web_server_fake_PEM.key
418418
openssl req -new -key web_server_fake_PEM.key -out web_server.csr -engine azcloudhsm_openssl
419419
openssl x509 -req -days 365 -in web_server.csr -signkey web_server_fake_PEM.key -out web_server.crt -engine azcloudhsm_openssl
420420
```
@@ -423,7 +423,7 @@ Use this command to create an EC key:
423423

424424
```bash
425425
./azcloudhsm_util singlecmd loginHSM -u CU -p user1234 -s cu1 genECCKeyPair -i 2 -l labelECTest
426-
./azcloudhsm_util singlecmd loginHSM -u CU -p user1234 -s cu1 getCaviumPrivKey -k {PRIVATE_KEY_HANDLE} -out web_server_fake_PEM.key
426+
./azcloudhsm_util singlecmd loginHSM -u CU -p user1234 -s cu1 getCaviumPrivKey -k <private-key-handle> -out web_server_fake_PEM.key
427427
openssl req -new -key web_server_fake_PEM.key -out web_server.csr -engine azcloudhsm_openssl
428428
openssl x509 -req -days 365 -in web_server.csr -signkey web_server_fake_PEM.key -out web_server.crt -engine azcloudhsm_openssl
429429
```

0 commit comments

Comments
 (0)