You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/secure-managed-hsm.md
+21-16Lines changed: 21 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
5
5
ms.author: mbaldwin
6
6
ms.service: security
7
7
ms.topic: best-practice
8
-
ms.date: 03/13/2026
8
+
ms.date: 03/31/2026
9
9
ms.custom: horz-security
10
10
ai-usage: ai-assisted
11
11
@@ -17,10 +17,10 @@ ai-usage: ai-assisted
17
17
18
18
Azure Managed HSM is a fully managed, highly available, single-tenant Hardware Security Module (HSM) service that provides FIPS 140-3 Level 3 validated cryptographic key protection for your cloud applications. Because Managed HSM safeguards your most sensitive cryptographic keys and secrets, implementing comprehensive security controls is essential to protect against threats and maintain business continuity.
19
19
20
-
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
21
-
22
20
This article provides security recommendations to help protect your Azure Managed HSM deployment.
23
21
22
+
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
23
+
24
24
## Service-specific security
25
25
26
26
Service-specific security addresses unique characteristics of Managed HSM, including hardware-level protection, FIPS compliance, and specialized cryptographic operations that distinguish it from other Azure services.
-**Configure cross-region replication for business continuity**: Enable multiregion replication to extend your Managed HSM from a primary region to an extended region, providing active-active deployment with automated replication. Both regions can serve requests, and the Traffic Manager routes requests to the closest available region, increasing SLA to 99.99% combined. See [Multi-region replication](multi-region-replication.md).
33
33
34
-
## Data protection
34
+
-**Control Azure Resource Manager key management access**: Managed HSM doesn't trust Azure Resource Manager by default, unlike standard Key Vault. If your environment requires portal-based or ARM template key management, explicitly enable the `AllowKeyManagementOperationsThroughARM` setting. Keep this setting disabled for higher-assurance environments where ARM trust is considered a risk. See [Allow key management operations through Azure Resource Manager](authorize-azure-resource-manager.md).
35
35
36
-
Data protection safeguards cryptographic keys and sensitive data stored in Managed HSM through encryption, key management policies, and secure storage practices. Proper data protection ensures key material remains confidential and tamper-resistant.
36
+
## Network security
37
37
38
-
-**Implement multiperson control for security domain**: Configure a security domain quorum with multiple RSA key pairs (minimum three recommended) to prevent single-person control over HSM recovery. Specify a quorum threshold that requires multiple key holders to collaborate for security domain decryption, ensuring no single individual can compromise the HSM. See [Security domain overview](security-domain.md).
38
+
Network security protects your Managed HSM through secure connectivity and network access controls. These network security features are listed from most restricted to least restricted capabilities. Pick the configuration that best suits your organization's use case. For detailed information about all network security configurations, see [Network security for Azure Key Vault Managed HSM](network-security.md).
39
39
40
-
-**Store security domain keys offline in secure locations**: Keep security domain private keys on encrypted, offline storage devices such as encrypted USB drives stored in separate geographical locations within physical safes or lock boxes. Never store security domain keys on internet-connected computers to reduce exposure to cyber threats and ensure air-gapped security. See [Security domain overview](security-domain.md).
40
+
-**Disable public network access and use Private Endpoints only**: Deploy Azure Private Link to establish private, secured connectivity to your Managed HSM instance by creating a private endpoint in your virtual network. Disabling public network access prevents access from public IP addresses by configuring your Managed HSM to deny public network access. This configuration prevents exposure to the public internet and routes all traffic over the Microsoft backbone network. See [Integrate Managed HSM with Azure Private Link](private-link.md).
41
41
42
-
-**Establish security domain key management procedures**: Implement policies for periodic review of security domain key custody when personnel changes occur or when keys might be compromised. Document security domain holder responsibilities, maintain accurate records of key locations and custody, and ensure the quorum can be assembled for disaster recovery scenarios. See [Security domain overview](security-domain.md).
42
+
-**Configure Managed HSM firewall with trusted services**: Configure Managed HSM firewall rules to deny public internet access while allowing specific trusted Azure services through the `--bypass AzureServices` setting when required by your scenario. This configuration restricts the attack surface while maintaining necessary service integrations. For full details, see [Network security: Managed HSM Firewall Enabled (Trusted Services)](network-security.md#managed-hsm-firewall-enabled-trusted-services).
43
43
44
-
-**Enable purge protection for HSM and keys**: Configure purge protection to prevent permanent deletion of the HSM or individual keys before the retention period expires. This control protects against accidental or malicious deletion and provides a recovery window for critical operations. See [Soft-delete overview](soft-delete-overview.md).
44
+
-**Enable IP Network Firewall**: Limit access to public static IP addresses when network scenarios require controlled public access. For full details, see [Network security: Managed HSM Firewall Enabled (IP Network Firewall)](network-security.md#managed-hsm-firewall-enabled-ip-network-firewall).
45
45
46
-
-**Configure appropriate soft-delete retention periods**: Set soft-delete retention periods between 7 to 90 days based on your recovery requirements and compliance needs. Longer retention periods provide more recovery time but might conflict with data residency requirements. See [Soft-delete overview](soft-delete-overview.md).
46
+
For step-by-step configuration instructions, see [How to configure Azure Managed HSM networking settings](configure-network-security.md).
47
47
48
48
## Identity and access management
49
49
@@ -61,17 +61,21 @@ Identity and access management secures authentication and authorization to your
61
61
62
62
-**Separate control plane and data plane access**: Understand that control plane access (Azure RBAC) for managing HSM resources doesn't grant data plane access to keys. Explicitly assign data plane roles through Managed HSM local RBAC to users who need to perform key operations. See [Access control for Managed HSM](access-control.md).
63
63
64
-
## Network security
64
+
## Data protection
65
65
66
-
Network security protects your Managed HSM through secure connectivity and network access controls. These network security features are listed from most restricted to least restricted capabilities. Pick the configuration that best suits your organization's use case. For detailed information about all network security configurations, see [Network security for Azure Key Vault Managed HSM](network-security.md).
66
+
Data protection safeguards cryptographic keys and sensitive data stored in Managed HSM through encryption, key management policies, and secure storage practices. Proper data protection ensures key material remains confidential and tamper-resistant.
67
67
68
-
-**Disable public network access and use Private Endpoints only**: Deploy Azure Private Link to establish private, secured connectivity to your Managed HSM instance by creating a private endpoint in your virtual network. Disabling public network access prevents access from public IP addresses by configuring your Managed HSM to deny public network access. This configuration prevents exposure to the public internet and routes all traffic over the Microsoft backbone network. See [Integrate Managed HSM with Azure Private Link](private-link.md).
68
+
-**Implement multiperson control for security domain**: Configure a security domain quorum with multiple RSA key pairs (minimum three recommended) to prevent single-person control over HSM recovery. Specify a quorum threshold that requires multiple key holders to collaborate for security domain decryption, ensuring no single individual can compromise the HSM. See [Security domain overview](security-domain.md).
69
69
70
-
-**Configure Managed HSM firewall with trusted services**: Configure Managed HSM firewall rules to deny public internet access while allowing specific trusted Azure services through the `--bypass AzureServices` setting when required by your scenario. This configuration restricts the attack surface while maintaining necessary service integrations. For full details, see [Network security: Managed HSM Firewall Enabled (Trusted Services)](network-security.md#managed-hsm-firewall-enabled-trusted-services).
70
+
-**Store security domain keys offline in secure locations**: Keep security domain private keys on encrypted, offline storage devices such as encrypted USB drives stored in separate geographical locations within physical safes or lock boxes. Never store security domain keys on internet-connected computers to reduce exposure to cyber threats and ensure air-gapped security. See [Security domain overview](security-domain.md).
71
71
72
-
-**Enable IP Network Firewall**: Limit access to public static IP addresses when network scenarios require controlled public access. For full details, see [Network security: Managed HSM Firewall Enabled (IP Network Firewall)](network-security.md#managed-hsm-firewall-enabled-ip-network-firewall).
72
+
-**Establish security domain key management procedures**: Implement policies for periodic review of security domain key custody when personnel changes occur or when keys might be compromised. Document security domain holder responsibilities, maintain accurate records of key locations and custody, and ensure the quorum can be assembled for disaster recovery scenarios. See [Security domain overview](security-domain.md).
73
73
74
-
For step-by-step configuration instructions, see [How to configure Azure Managed HSM networking settings](configure-network-security.md).
74
+
-**Enable purge protection for HSM and keys**: Configure purge protection to prevent permanent deletion of the HSM or individual keys before the retention period expires. This control protects against accidental or malicious deletion and provides a recovery window for critical operations. See [Soft-delete overview](soft-delete-overview.md).
75
+
76
+
-**Configure appropriate soft-delete retention periods**: Set soft-delete retention periods between 7 to 90 days based on your recovery requirements and compliance needs. Longer retention periods provide more recovery time but might conflict with data residency requirements. See [Soft-delete overview](soft-delete-overview.md).
77
+
78
+
-**Configure automated key rotation**: Set up automated key rotation policies to regularly generate new key versions without manual intervention. Managed HSM supports both creation-based and expiration-based rotation triggers with a minimum rotation interval of 28 days. Automated key rotation helps meet cryptographic best practices that recommend rotating encryption keys at least every two years. See [Configure key autorotation in Azure Managed HSM](key-rotation.md).
75
79
76
80
## Logging and monitoring
77
81
@@ -121,5 +125,6 @@ Backup and recovery protects against data loss and enables business continuity t
121
125
-[Integrate with Azure Private Link](private-link.md)
0 commit comments