You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Audit and fix secure-confidential-ledger.md security article
Fixes all issues identified in security horizontal audit:
- Add ai-usage: ai-assisted front matter tag
- Add Zero Trust include banner
- Fix TLS version claim: '1.2 and 1.3' -> '1.3' (per overview.md source)
- Restructure to standard section ordering:
- Merge 'Identity management' + 'Privileged access' into
'Identity and access management'
- Rename 'Data integrity and protection' to 'Data protection'
- Split 'Resiliency and monitoring' into 'Logging and monitoring'
and 'Backup and recovery'
- Add new 'Logging and monitoring' section (Azure Monitor, audit trails)
- Add new 'Compliance and governance' section (data residency, integrated
service compliance, immutability guarantees)
- Add UDF security consideration under identity section
- Add three-level encryption detail for private ledgers
- Update ms.date and Next steps links
Co-authored-by: Copilot <[email protected]>
Copy file name to clipboardExpand all lines: articles/confidential-ledger/secure-confidential-ledger.md
+38-20Lines changed: 38 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,8 @@ ms.author: mbaldwin
6
6
ms.service: security
7
7
ms.topic: best-practice
8
8
ms.custom: horz-security
9
-
ms.date: 09/26/2025
9
+
ms.date: 04/01/2026
10
+
ai-usage: ai-assisted
10
11
---
11
12
12
13
# Secure your Azure confidential ledger deployment
@@ -15,41 +16,41 @@ Azure confidential ledger (ACL) is a highly secure immutable data store for mana
15
16
16
17
This article provides guidance on how to best secure your Azure confidential ledger deployment.
17
18
19
+
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
20
+
18
21
## Network security
19
22
20
23
Azure confidential ledger runs exclusively on hardware-backed secure enclaves, providing an isolated runtime environment to protect your data from external threats. The service utilizes secure communication channels and a minimalistic Trusted Computing Base (TCB) to maintain data integrity.
21
24
22
25
-**Verify ledger authenticity before exchanging data**: Always authenticate the ledger nodes before establishing a connection to ensure you're communicating with legitimate ACL nodes. This verification helps prevent sophisticated man-in-the-middle attacks and ensures your data is flowing to the intended location. For more details, see [Authenticating Azure confidential ledger nodes](authenticate-ledger-nodes.md).
23
26
24
-
-**Understand TLS connection security**: Azure confidential ledger supports TLS 1.2 and 1.3 protocols for client connections, with connections terminating inside hardware-backed security enclaves. This approach prevents man-in-the-middle attacks, as neither Azure administrators nor anyone else can access data inside the secure enclave. For more information, see the [Azure confidential ledger FAQ](faq.yml).
27
+
-**Understand TLS connection security**: Azure confidential ledger uses the TLS 1.3 protocol for client connections, with connections terminating inside hardware-backed security enclaves. This approach prevents man-in-the-middle attacks, as neither Azure administrators nor anyone else can access data inside the secure enclave. For more information, see the [Azure confidential ledger FAQ](faq.yml).
25
28
26
29
-**Verify node quotes to establish trust**: Use the `verify_quote.sh` script (installed with the CCF Python package) to verify that the nodes your applications connect to are running trusted code within legitimate Intel SGX enclaves. This verification confirms the cryptographic hash of the node's identity public key matches the SGX report data. For more details, see [Establish trust on Azure confidential ledger](verify-node-quotes.md).
27
30
28
-
## Identity management
31
+
## Identity and access management
29
32
30
-
Azure confidential ledger supports robust identity and access management options, allowing you to implement secure authentication methods appropriate for your workload.
33
+
Azure confidential ledger supports robust identity and access management options. Unlike other Azure services, ACL user management is localized within the ledger itself, providing an additional layer of security by reducing the Trusted Computing Base and eliminating reliance on external authorization systems.
31
34
32
35
-**Use Microsoft Entra ID for authentication**: Microsoft Entra ID is the recommended authentication method for Azure confidential ledger. This approach ensures that your directory credentials are never exposed to the confidential ledger service and leverages Microsoft's secure identity platform. For more information, see [Azure confidential ledger authentication with Microsoft Entra ID](authentication-azure-ad.md).
33
36
34
37
-**Register your application properly with Microsoft Entra ID**: To use Microsoft Entra authentication, register your application with the appropriate configuration settings, including redirect URIs and permissions. A properly registered application establishes a trust relationship between your app and the Microsoft identity platform. See [How to register an Azure confidential ledger application with Microsoft Entra ID](register-application.md) for detailed steps.
35
38
36
39
-**Use certificate-based authentication for additional security**: For high-security scenarios or non-interactive applications, implement certificate-based authentication. This approach uses cryptographic certificates to establish identity rather than username/password combinations, enhancing security. Ensure you create certificates using secure methods with appropriate key lengths and algorithms. See [Creating a client certificate](create-client-certificate.md) for guidance.
37
40
38
-
## Privileged access
39
-
40
-
Managing access rights is critical to maintaining the security posture of your Azure confidential ledger. Unlike other Azure services, ACL user management is localized within the ledger itself, providing an additional layer of security.
41
-
42
41
-**Apply least privilege principles with role-based controls**: Assign users the minimum necessary permissions by using ACL's built-in roles: Reader (read-only), Contributor (read and write), and Administrator (read, write, and manage users). This approach limits potential damage if account credentials are compromised. For more details, see [Manage Microsoft Entra token-based users](manage-azure-ad-token-based-users.md) or [Manage certificate-based users](manage-certificate-based-users.md).
43
42
44
43
-**Carefully manage Administrator accounts**: Limit the number of users with Administrator role to only those who absolutely need to manage other users or perform administrative functions. Remember that Microsoft cannot help manage users once a ledger is created, so maintain proper access to administrator accounts. For more information, see the [Azure confidential ledger FAQ](faq.yml).
45
44
46
45
-**Implement proper user lifecycle management**: Regularly review and audit user access to your ledger, removing access for users who no longer require it. When adding new users, follow the principle of least privilege by starting with Reader access and only elevating privileges when necessary. For implementation details, consult [Manage Microsoft Entra token-based users](manage-azure-ad-token-based-users.md).
47
46
48
-
## Data integrity and protection
47
+
-**Review UDF authentication for advanced scenarios**: If you use advanced user defined functions (UDFs), be aware that they support custom authentication and authorization mechanisms. Ensure that any custom endpoints enforce appropriate access controls and don't bypass the ledger's built-in role-based security. For more information, see [Advanced user defined functions in Azure confidential ledger](user-defined-endpoints.md).
48
+
49
+
## Data protection
49
50
50
-
Azure confidential ledger is designed to provide strong data integrity guarantees through its immutable, append-only architecture and cryptographic verification mechanisms.
51
+
Azure confidential ledger is designed to provide strong data integrity and confidentiality guarantees through its immutable, append-only architecture, hardware-backed enclaves, and cryptographic verification mechanisms.
51
52
52
-
-**Choose the appropriate ledger type for your data sensitivity**: When creating a confidential ledger, select between a private (encrypted) or public (plaintext) ledger type based on your security requirements. Private ledgers offer enhanced confidentiality through encryption, while public ledgers provide transparency. This decision cannot be changed after ledger creation. For more information, see the [Azure confidential ledger overview](overview.md).
53
+
-**Choose the appropriate ledger type for your data sensitivity**: When creating a confidential ledger, select between a private (encrypted) or public (plaintext) ledger type based on your security requirements. Private ledgers encrypt data using three levels of encryption (ledger secrets, ledger secret wrapping key, and recovery key shares). Public ledgers store data in plaintext, suitable for scenarios that require transparency. This decision cannot be changed after ledger creation. For more information, see the [Azure confidential ledger overview](overview.md).
53
54
54
55
-**Verify transaction integrity using receipts**: For critical transactions, retrieve and store transaction receipts, which contain cryptographic proofs that the transaction was correctly committed to the ledger. These receipts enable you to verify transaction integrity without maintaining copies of the ledger data. For implementation details, see [Azure Confidential Ledger write transaction receipts](write-transaction-receipts.md).
55
56
@@ -59,24 +60,41 @@ Azure confidential ledger is designed to provide strong data integrity guarantee
59
60
60
61
-**Consider integrating with other Azure data stores for comprehensive protection**: For relational or blob data requiring end-to-end integrity guarantees, integrate your data stores with Azure Confidential Ledger. Use the Azure SQL database's ledger feature with ACL as a Trusted Digest store, or use the Azure Marketplace application to protect blob storage integrity. See [Microsoft Azure confidential ledger overview](overview.md) for integration scenarios.
61
62
62
-
## Resiliency and monitoring
63
+
## Logging and monitoring
64
+
65
+
Comprehensive logging and monitoring enable detection of suspicious activities and support compliance with audit requirements.
66
+
67
+
-**Enable diagnostic logging with Azure Monitor**: If your organization requires operational visibility into ledger activity, enable Azure Monitor diagnostic logs. Configure your Log Analytics workspace to store and analyze diagnostic data according to your retention and compliance policies. For more information, see [Azure Monitor overview](/azure/azure-monitor/overview).
68
+
69
+
-**Use transaction receipts for audit trails**: Azure confidential ledger provides built-in auditability through its append-only ledger and cryptographic receipts. Use these capabilities to create audit trails for regulatory compliance and forensic analysis. Each transaction produces a Merkle tree-based proof that can be independently verified. For details, see [Azure Confidential Ledger write transaction receipts](write-transaction-receipts.md).
70
+
71
+
-**Monitor instance health**: Azure confidential ledger uses continuous monitoring to observe instance health and automatically initiate recovery processes when the health of the confidential instance falls below a specified threshold. Understand this behavior to complement it with your own monitoring practices.
72
+
73
+
## Compliance and governance
74
+
75
+
Regular review of compliance posture and governance policies ensures your Azure confidential ledger deployment adheres to security standards and organizational requirements.
76
+
77
+
-**Understand data residency and replication**: Azure confidential ledger automatically replicates data to Azure regional pairs for disaster recovery. You can't modify or disable this replication behavior. Ensure that both the primary and paired regions meet your compliance and regulatory requirements before creating a ledger. For more information, see [Data residency for Azure Confidential Ledger](data-residency.md).
78
+
79
+
-**Review integrated service compliance**: Azure confidential ledger can integrate with Azure Key Vault for key management, Azure SQL Database for ledger-backed integrity, and Azure Blob Storage for digest protection. Each integrated service has its own compliance posture and data residency characteristics. Review the compliance documentation for each service you use alongside Azure confidential ledger.
80
+
81
+
-**Understand the immutability guarantee**: Azure confidential ledger provides tamper-evident, append-only storage that's ideal for meeting regulatory requirements around data integrity and audit trails. This property makes the ledger suitable for compliance scenarios where records must be protected from modification or deletion.
82
+
83
+
## Backup and recovery
63
84
64
85
Azure confidential ledger is designed with resiliency features to ensure high availability and business continuity.
65
86
66
87
-**Understand the resiliency architecture**: Azure confidential ledger nodes are deployed across Azure Availability Zones (AZ) to provide resilience against zone failures. The network automatically self-heals during zone-wide outages, helping maintain service availability. For more information, see [Azure confidential ledger architecture](architecture.md).
67
88
68
-
-**Plan for business continuity**: Azure confidential ledger automatically replicates ledger files to secondary storage periodically to support disaster recovery. Understand that continuous monitoring is used to observe instance health and automatically initiate recovery processes when needed. For more details, see [Azure confidential ledger overview](overview.md).
69
-
70
-
-**Understand data residency requirements**: Azure confidential ledger automatically replicates data to Azure regional pairs for disaster recovery purposes. Review the data residency implications to ensure both the primary and paired regions meet your compliance and regulatory requirements. For more information, see [Data residency for Azure Confidential Ledger](data-residency.md).
89
+
-**Plan for business continuity**: Azure confidential ledger automatically replicates ledger files to secondary storage periodically to support disaster recovery. In the event of a region-wide outage, Microsoft might initiate a failover to the paired region to restore service availability. For more details, see [Data residency for Azure Confidential Ledger](data-residency.md).
71
90
72
-
-**Be aware of deletion implications**: Azure confidential ledger uses "hard delete" when a ledger is deleted, meaning your data will not be recoverable after deletion. Carefully consider any decision to delete a confidential ledger, as this action is permanent. For more information, see [Azure confidential ledger overview](overview.md).
91
+
-**Be aware of deletion implications**: Azure confidential ledger uses "hard delete" when a ledger is deleted, meaning your data isn't recoverable after deletion. Carefully consider any decision to delete a confidential ledger, as this action is permanent. For more information, see [Azure confidential ledger overview](overview.md).
73
92
74
93
## Next steps
75
94
76
95
-[Overview of Microsoft Azure confidential ledger](overview.md)
0 commit comments