Skip to content

Commit ad9437e

Browse files
msmbaldwinCopilot
andcommitted
Second pass: fix FIPS claim in about-secrets, refine security-domain wording
- Fix about-secrets.md: replace stale FIPS 140-2 Level 3 claim with link to compliance table - Refine security-domain.md: 'HSM hardware and cryptographic design' (not just firmware) Co-authored-by: Copilot <[email protected]>
1 parent 715a3f0 commit ad9437e

2 files changed

Lines changed: 4 additions & 4 deletions

File tree

articles/key-vault/managed-hsm/security-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ A managed HSM security domain serves the following purposes:
2626
- The managed HSM instance was soft-deleted by a customer and the resource was purged after the mandatory retention period expired.
2727
- The customer archived a project by performing a backup that included the managed HSM instance and all data, and then deleted all Azure resources that were associated with the project.
2828

29-
Without the security domain, disaster recovery isn't possible — all keys are permanently and irrecoverably lost. Microsoft has no way to recover the security domain, and Microsoft can't access your keys without the security domain. This is architecturally enforced by the HSM firmware, not merely by policy. Protecting the security domain is therefore of the utmost importance for your business continuity.
29+
Without the security domain, disaster recovery isn't possible — all keys are permanently and irrecoverably lost. Microsoft has no way to recover the security domain, and Microsoft can't access your keys without the security domain. This is architecturally enforced by the HSM hardware and cryptographic design, not merely by policy. Protecting the security domain is therefore of the utmost importance for your business continuity.
3030

3131
## Security domain protection best practices
3232

articles/key-vault/secrets/about-secrets.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: secrets
99
ms.topic: overview
10-
ms.date: 01/08/2026
10+
ms.date: 04/02/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -23,9 +23,9 @@ Key Vault also supports a contentType field for secrets. Clients can specify the
2323

2424
## Encryption
2525

26-
Key Vault stores all secrets in your key vault as encrypted data. Key Vault encrypts secrets at rest by using a hierarchy of encryption keys, and modules that are FIPS 140-2 compliant protect all keys in that hierarchy. This encryption is transparent and requires no action from you. The Azure Key Vault service encrypts your secrets when you add them and decrypts them automatically when you read them.
26+
Key Vault stores all secrets in your key vault as encrypted data. Key Vault encrypts secrets at rest by using a hierarchy of encryption keys, with all keys in the hierarchy protected by FIPS-validated modules. This encryption is transparent and requires no action from you. The Azure Key Vault service encrypts your secrets when you add them and decrypts them automatically when you read them.
2727

28-
The encryption leaf key of the key hierarchy is unique to each key vault. The encryption root key of the key hierarchy is unique to the security world and is protected by a module validated for FIPS 140-2 Level 3 or higher.
28+
The encryption leaf key of the key hierarchy is unique to each key vault. The encryption root key of the key hierarchy is unique to the security world. For information about the FIPS validation levels for each Key Vault tier and Managed HSM, see [About keys: Compliance](/azure/key-vault/keys/about-keys#compliance).
2929

3030
## Secret attributes
3131

0 commit comments

Comments
 (0)