Skip to content

Commit 715a3f0

Browse files
msmbaldwinCopilot
andcommitted
Align Key Vault/MHSM articles with authoritative CMK Q&A guidance
- Add rotation != re-encryption clarification to key rotation article - Fix FIPS version ambiguity in about-keys-details (140 -> 140-3/140-2) - Fix misleading 'fully managed by Microsoft' in mhsm-control-data - Reframe CMK as control model in mhsm-control-data - Strengthen security domain irrecoverability warning - Add FIPS 140-3 Level 3 to security-domain.md - Make single-region-only limitation explicit in multi-region-replication Co-authored-by: Copilot <[email protected]>
1 parent 72dda26 commit 715a3f0

5 files changed

Lines changed: 17 additions & 15 deletions

File tree

articles/key-vault/keys/about-keys-details.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: concept-article
10-
ms.date: 03/06/2026
10+
ms.date: 04/02/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -139,10 +139,10 @@ The following read-only attributes are included in any response that includes ke
139139
- *created*: IntDate, optional. The *created* attribute indicates when this version of the key was created. The value is null for keys created before the addition of this attribute. Its value MUST be a number containing an IntDate value.
140140
- *updated*: IntDate, optional. The *updated* attribute indicates when this version of the key was updated. The value is null for keys that were last updated before the addition of this attribute. Its value MUST be a number containing an IntDate value.
141141
- *hsmPlatform*: string, optional. The underlying HSM platform that protects a key.
142-
- A `hsmPlatform` value of `2` means the key is protected by the latest FIPS 140 Level 3 validated HSM platform.
143-
- A `hsmPlatform` value of `1` means the key is protected by the previous FIPS 140 Level 2 validated HSM platform.
144-
- A `hsmPlatform` value of `0` means the key is protected by a FIPS 140 Level 1 software cryptographic module.
145-
- If you don't set this value by using a Managed HSM pool, the key is protected by the latest FIPS 140 Level 3 validated HSM platform.
142+
- A `hsmPlatform` value of `2` means the key is protected by the latest FIPS 140-3 Level 3 validated HSM platform.
143+
- A `hsmPlatform` value of `1` means the key is protected by the previous FIPS 140-2 Level 2 validated HSM platform.
144+
- A `hsmPlatform` value of `0` means the key is protected by a FIPS 140-2 Level 1 software cryptographic module.
145+
- If you don't set this value by using a Managed HSM pool, the key is protected by the latest FIPS 140-3 Level 3 validated HSM platform.
146146

147147
Keys are bound to the HSM in which you created them. You create and store new keys seamlessly in the new HSMs. While you can't migrate or transfer keys, new key versions are automatically in the new HSMs. For more information about how to migrate to a new key, see [How to migrate key workloads](../general/migrate-key-workloads.md).
148148

articles/key-vault/keys/how-to-configure-key-rotation.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: devx-track-arm-template, sfi-image-nochange, copilot-scenario-highlig
88
ms.service: azure-key-vault
99
ms.subservice: keys
1010
ms.topic: how-to
11-
ms.date: 01/30/2026
11+
ms.date: 04/02/2026
1212
ms.author: mbaldwin
1313
---
1414

@@ -59,7 +59,9 @@ Key rotation policy settings:
5959
- Notification time: key near expiry event interval for Event Grid notification. It requires 'Expiry Time' set on rotation policy and 'Expiration Date' set on the key.
6060

6161
> [!IMPORTANT]
62-
> Key rotation generates a new key version of an existing key with new key material. Target services should use versionless key URI to automatically refresh to the latest version of the key. Ensure that your data encryption solution stores versioned key URI with data to point to the same key material for decrypt/unwrap as was used for encrypt/wrap operations to avoid disruption to your services. All Azure services currently follow that pattern for data encryption.
62+
> Key rotation generates a new key version of an existing key with new key material. Target services should use versionless key URI to automatically refresh to the latest version of the key. Ensure that your data encryption solution stores versioned key URI with data to point to the same key material for decrypt/unwrap operations to avoid disruption to your services. All Azure services currently follow that pattern for data encryption.
63+
>
64+
> Key rotation re-wraps data encryption keys (DEKs) with the new key version — it does not re-encrypt the underlying data. Both old and new key versions must remain enabled until re-wrapping is complete, because existing data remains encrypted under DEKs wrapped by the old key version.
6365
6466
:::image type="content" source="../media/keys/key-rotation/key-rotation-1.png" alt-text="Rotation policy configuration":::
6567

articles/key-vault/managed-hsm/mhsm-control-data.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice: managed-hsm
66
ms.topic: concept-article
77
author: nkondamudi
88
ms.author: nkondamudi
9-
ms.date: 01/08/2026
9+
ms.date: 04/02/2026
1010
---
1111

1212
# Control your data in the cloud by using Managed HSM
@@ -28,10 +28,10 @@ Azure Key Vault services provide encryption and key management solutions that sa
2828
Secure key management is essential to protect and control data in the cloud. Azure offers various solutions that you can use to manage and control access to encryption keys so that you have choice and flexibility to meet stringent data protection and compliance needs.
2929

3030
- **Azure platform encryption** is a *platform-managed* encryption solution that encrypts by using host-level encryption. Platform-managed keys are encryption keys that are generated, stored, and managed entirely by Azure.
31-
- **Customer-managed keys** are keys that are created, read, deleted, updated, and administered entirely by the customer. Customer-managed keys can be stored in a cloud key management service like Azure Key Vault.
31+
- **Customer-managed keys (CMK)** is a key management control model in which the customer creates, rotates, and manages the key encryption key (KEK) lifecycle. Azure services use these customer-owned keys to wrap and unwrap their data encryption keys. Customer-managed keys can be stored in Azure Key Vault or Azure Managed HSM.
3232
- **Azure Key Vault Standard** encrypts by using a software key and is FIPS 140-2 Level 1 compliant.
3333
- **Azure Key Vault Premium** encrypts by using keys protected by [FIPS 140 validated HSMs](/azure/key-vault/keys/about-keys#compliance).
34-
- **Azure Key Vault Managed HSM** encrypts by using single-tenant FIPS 140-3 Level 3 HSM protected keys and is fully managed by Microsoft.
34+
- **Azure Key Vault Managed HSM** is a fully managed service that encrypts by using single-tenant, customer-controlled, FIPS 140-3 Level 3 HSM-protected keys.
3535

3636
For added assurance, in Azure Key Vault Premium and Azure Key Vault Managed HSM, you can [bring your own key (BYOK)](../keys/hsm-protected-keys-byok.md) and import HSM-protected keys from an on-premises HSM.
3737

articles/key-vault/managed-hsm/multi-region-replication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: managed-hsm
88
ms.topic: tutorial
9-
ms.date: 03/10/2026
9+
ms.date: 04/02/2026
1010

1111
ms.author: nkondamudi
1212
ms.custom: references_regions
1313
---
1414
# Enable multi-region replication on Azure Managed HSM
1515

16-
Multi-region replication allows you to extend a managed HSM pool from one Azure region (called the primary region) to another Azure region (called an extended region). Once configured, both regions are active, able to serve requests and, with automated replication, share the same key material, roles, and permissions. The closest available region to the application receives and fulfills the request, maximizing read throughput and latency. While regional outages are rare, multi-region replication enhances the availability of mission critical cryptographic keys should one region become unavailable. When multi-region replication is enabled, the SLA for the primary and extension pools combined increases to 99.99. For more information on SLA, visit [SLA for Azure Key Vault Managed HSM](https://azure.microsoft.com/support/legal/sla/key-vault-managed-hsm/v1_0/).
16+
Multi-region replication allows you to extend a managed HSM pool from one Azure region (called the primary region) to one additional Azure region (called an extended region). Extension is supported to a single additional region only. Once configured, both regions are active, able to serve requests and, with automated replication, share the same key material, roles, and permissions. The closest available region to the application receives and fulfills the request, maximizing read throughput and latency. While regional outages are rare, multi-region replication enhances the availability of mission critical cryptographic keys should one region become unavailable. When multi-region replication is enabled, the SLA for the primary and extension pools combined increases to 99.99. For more information on SLA, visit [SLA for Azure Key Vault Managed HSM](https://azure.microsoft.com/support/legal/sla/key-vault-managed-hsm/v1_0/).
1717

1818
## Architecture
1919

articles/key-vault/managed-hsm/security-domain.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ ms.subservice: managed-hsm
66
ms.topic: concept-article
77
author: msmbaldwin
88
ms.author: mbaldwin
9-
ms.date: 04/14/2025
9+
ms.date: 04/02/2026
1010

1111
---
1212

1313
# Security domain in Managed HSM overview
1414

15-
A managed HSM is a single-tenant, [Federal Information Processing Standards (FIPS) 140-3 validated](https://csrc.nist.gov/publications/detail/fips/140/3/final), highly available, hardware security module (HSM) that has a customer-controlled security domain.
15+
A managed HSM is a single-tenant, [Federal Information Processing Standards (FIPS) 140-3 Level 3 validated](https://csrc.nist.gov/publications/detail/fips/140/3/final), highly available, hardware security module (HSM) that has a customer-controlled security domain.
1616

1717
To operate, a managed HSM must have a security domain. The security domain is an encrypted blob file that contains artifacts like the HSM backup, user credentials, the signing key, and the data encryption key that's unique to the managed HSM.
1818

@@ -26,7 +26,7 @@ A managed HSM security domain serves the following purposes:
2626
- The managed HSM instance was soft-deleted by a customer and the resource was purged after the mandatory retention period expired.
2727
- The customer archived a project by performing a backup that included the managed HSM instance and all data, and then deleted all Azure resources that were associated with the project.
2828

29-
Without the security domain, disaster recovery isn't possible. Microsoft has no way to recover the security domain, and Microsoft can't access your keys without the security domain. Protecting the security domain is therefore of the utmost importance for your business continuity, and to ensure that you aren't cryptographically locked out.
29+
Without the security domain, disaster recovery isn't possible — all keys are permanently and irrecoverably lost. Microsoft has no way to recover the security domain, and Microsoft can't access your keys without the security domain. This is architecturally enforced by the HSM firmware, not merely by policy. Protecting the security domain is therefore of the utmost importance for your business continuity.
3030

3131
## Security domain protection best practices
3232

0 commit comments

Comments
 (0)