Skip to content

Commit bd0908b

Browse files
committed
update
1 parent 88d9137 commit bd0908b

2 files changed

Lines changed: 41 additions & 36 deletions

File tree

articles/cloud-hsm/authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Authentication is a crucial aspect of securely accessing and operating within Az
1515

1616
## Cloud HSM CLI authentication
1717

18-
You can authenticate by using CLI tools like `azcloudhsm_util` in either interactive mode or single-command mode. In interactive mode, use the `login` command. For single-command mode, include `singlecmd` and parameters for `loginHSM`. We advise you to securely store your HSM credentials when your application isn't using them.
18+
You can authenticate by using CLI tools like `azcloudhsm_util` in either interactive mode or single-command mode. In interactive mode, use the `loginHSM` command. For single-command mode, include `singlecmd` and parameters for `loginHSM`. We advise you to securely store your HSM credentials when your application isn't using them.
1919

2020
### Interactive mode
2121

articles/key-vault/keys/how-to-configure-key-rotation.md

Lines changed: 40 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -14,65 +14,68 @@ ms.author: mbaldwin
1414

1515
# Configure cryptographic key auto-rotation in Azure Key Vault
1616

17-
## Overview
18-
Automated cryptographic key rotation in [Key Vault](../general/overview.md) allows users to configure Key Vault to automatically generate a new key version at a specified frequency. To configure rotation you can use key rotation policy, which can be defined on each individual key.
17+
By automating cryptographic key rotation in [Key Vault](../general/overview.md), you can set up Key Vault to automatically create a new key version at a chosen frequency. To set up rotation, use the key rotation policy, which you can define for each individual key.
1918

20-
Our recommendation is to rotate encryption keys at least every two years to meet cryptographic best practices.
19+
To follow cryptographic best practices, rotate encryption keys at least every two years.
2120

22-
For more information about how objects in Key Vault are versioned, see [Key Vault objects, identifiers, and versioning](../general/about-keys-secrets-certificates.md#objects-identifiers-and-versioning). For a comprehensive understanding of autorotation concepts across different asset types in Azure Key Vault, see [Understanding autorotation in Azure Key Vault](../general/autorotation.md).
21+
For more information about how Key Vault versions objects, see [Key Vault objects, identifiers, and versioning](../general/about-keys-secrets-certificates.md#objects-identifiers-and-versioning). For a comprehensive understanding of autorotation concepts across different asset types in Azure Key Vault, see [Understanding autorotation in Azure Key Vault](../general/autorotation.md).
2322

2423
## Integration with Azure services
25-
This feature enables end-to-end zero-touch rotation for encryption at rest for Azure services with customer-managed key (CMK) stored in Azure Key Vault. Please refer to specific Azure service documentation to see if the service covers end-to-end rotation.
24+
25+
This feature enables end-to-end zero-touch rotation for encryption at rest for Azure services with customer-managed key (CMK) stored in Azure Key Vault. Check the specific Azure service documentation to see if the service supports end-to-end rotation.
26+
27+
> [!NOTE]
28+
> When you rotate customer-managed keys that Azure services use, the time it takes for each service to detect and apply the new key version varies (from one hour to 24 hours or more). Consult the specific Azure service documentation for guidance on when you can safely disable the old key version after rotation.
2629
2730
For more information about data encryption in Azure, see:
2831
- [Azure Encryption at Rest](/azure/security/fundamentals/encryption-atrest#azure-encryption-at-rest-components)
2932
- [Azure services data encryption support table](/azure/security/fundamentals/encryption-models#supporting-services)
3033

3134
## Pricing
3235

33-
There's an additional cost per scheduled key rotation. For more information, see [Azure Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/)
36+
There's an extra cost for each scheduled key rotation. For more information, see the [Azure Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/).
3437

3538
## Permissions required
3639

37-
Key Vault key rotation feature requires key management permissions. You can assign a "Key Vault Crypto Officer" role to manage rotation policy and on-demand rotation.
40+
The Key Vault key rotation feature requires key management permissions. Assign the **Key Vault Crypto Officer** role to manage the rotation policy and on-demand rotation.
3841

39-
For more information on how to use Azure RBAC for Key Vault and assign Azure roles, see [Use an Azure RBAC to control access to keys, certificates and secrets](../general/rbac-guide.md)
42+
For more information on how to use Azure RBAC for Key Vault and assign Azure roles, see [Use an Azure RBAC to control access to keys, certificates and secrets](../general/rbac-guide.md).
4043

4144
> [!NOTE]
42-
> If you use an access policies permission model, it is required to set 'Rotate', 'Set Rotation Policy', and 'Get Rotation Policy' key permissions to manage rotation policy on keys.
45+
> If you use the access policies permission model, set the 'Rotate', 'Set Rotation Policy', and 'Get Rotation Policy' key permissions to manage the rotation policy on keys.
4346
4447
## Key rotation policy
4548

46-
The key rotation policy allows users to configure rotation and Event Grid notifications near expiry notification.
49+
The key rotation policy allows you to configure rotation and Event Grid notifications for near expiry notification.
4750

4851
Key rotation policy settings:
4952

50-
- Expiry time: key expiration interval. It's used to set expiration date on newly rotated key. It doesn't affect a current key.
51-
- Enabled/disabled: flag to enable or disable rotation for the key
53+
- Expiry time: key expiration interval. It sets the expiration date on the newly rotated key. It doesn't affect the current key.
54+
- Enabled/disabled: flag to enable or disable rotation for the key.
5255
- Rotation types:
53-
- Automatically renew at a given time after creation (default)
56+
- Automatically renew at a given time after creation (default).
5457
- Automatically renew at a given time before expiry. It requires 'Expiry Time' set on rotation policy and 'Expiration Date' set on the key.
55-
- Rotation time: key rotation interval, the minimum value is seven days from creation and seven days from expiration time
58+
- Rotation time: key rotation interval. The minimum value is seven days from creation and seven days from expiration time.
5659
- Notification time: key near expiry event interval for Event Grid notification. It requires 'Expiry Time' set on rotation policy and 'Expiration Date' set on the key.
5760

5861
> [!IMPORTANT]
59-
> Key rotation generates a new key version of an existing key with new key material. Target services should use versionless key uri to automatically refresh to latest version of the key. Ensure that your data encryption solution stores versioned key uri with data to point to the same key material for decrypt/unwrap as was used for encrypt/wrap operations to avoid disruption to your services. All Azure services are currently following that pattern for data encryption.
62+
> Key rotation generates a new key version of an existing key with new key material. Target services should use versionless key URI to automatically refresh to the latest version of the key. Ensure that your data encryption solution stores versioned key URI with data to point to the same key material for decrypt/unwrap as was used for encrypt/wrap operations to avoid disruption to your services. All Azure services currently follow that pattern for data encryption.
6063
6164
:::image type="content" source="../media/keys/key-rotation/key-rotation-1.png" alt-text="Rotation policy configuration":::
6265

6366
## Configure key rotation policy
6467

65-
Configure key rotation policy during key creation.
68+
Configure the key rotation policy during key creation.
6669

6770
:::image type="content" source="../media/keys/key-rotation/key-rotation-2.png" alt-text="Configure rotation during key creation":::
6871

69-
Configure rotation policy on existing keys.
72+
Configure the rotation policy on existing keys.
7073

7174
:::image type="content" source="../media/keys/key-rotation/key-rotation-3.png" alt-text="Configure rotation on existing key":::
7275

7376
### Azure CLI
7477

75-
Save key rotation policy to a file. Key rotation policy example:
78+
Save the key rotation policy to a file. Here's an example of a key rotation policy:
7679

7780
```json
7881
{
@@ -109,51 +112,53 @@ az keyvault key rotation-policy update --vault-name <vault-name> --name <key-nam
109112

110113
### Azure PowerShell
111114

112-
Set rotation policy using Azure Powershell [Set-AzKeyVaultKeyRotationPolicy](/powershell/module/az.keyvault/set-azkeyvaultkeyrotationpolicy) cmdlet.
115+
Set the rotation policy by using the Azure PowerShell [Set-AzKeyVaultKeyRotationPolicy](/powershell/module/az.keyvault/set-azkeyvaultkeyrotationpolicy) cmdlet.
113116

114117
```powershell
115118
Set-AzKeyVaultKeyRotationPolicy -VaultName <vault-name> -KeyName <key-name> -ExpiresIn (New-TimeSpan -Days 720) -KeyRotationLifetimeAction @{Action="Rotate";TimeAfterCreate= (New-TimeSpan -Days 540)}
116119
```
120+
117121
## Rotation on demand
118122

119-
Key rotation can be invoked manually.
123+
You can manually invoke key rotation.
120124

121125
### Portal
122-
Click 'Rotate Now' to invoke rotation.
126+
127+
Select **Rotate Now** to start the rotation process.
123128

124129
:::image type="content" source="../media/keys/key-rotation/key-rotation-4.png" alt-text="Rotation on-demand":::
125130

126131
### Azure CLI
127132

128-
Use Azure CLI [az keyvault key rotate](/cli/azure/keyvault/key#az-keyvault-key-rotate) command to rotate key.
133+
Use the Azure CLI [az keyvault key rotate](/cli/azure/keyvault/key#az-keyvault-key-rotate) command to rotate a key.
129134

130135
```azurecli
131136
az keyvault key rotate --vault-name <vault-name> --name <key-name>
132137
```
133138

134139
### Azure PowerShell
135140

136-
Use Azure PowerShell [Invoke-AzKeyVaultKeyRotation](/powershell/module/az.keyvault/invoke-azkeyvaultkeyrotation) cmdlet.
141+
Use the Azure PowerShell [Invoke-AzKeyVaultKeyRotation](/powershell/module/az.keyvault/invoke-azkeyvaultkeyrotation) cmdlet to rotate a key.
137142

138143
```powershell
139144
Invoke-AzKeyVaultKeyRotation -VaultName <vault-name> -Name <key-name>
140145
```
141146

142147
## Configure key near expiry notification
143148

144-
Configuration of expiry notification for Event Grid key near expiry event. In case when automated rotation cannot be used, like when a key is imported from local HSM, you can configure near expiry notification as a reminder for manual rotation or as a trigger to custom automated rotation through integration with Event Grid. You can configure notification with days, months and years before expiry to trigger near expiry event.
149+
You can configure an expiry notification for the Event Grid key near expiry event. If automated rotation can't be used, like when a key is imported from local HSM, you can configure near expiry notification as a reminder for manual rotation or as a trigger to custom automated rotation through integration with Event Grid. You can set the notification to trigger the near expiry event days, months, or years before the key expires.
145150

146151
:::image type="content" source="../media/keys/key-rotation/key-rotation-5.png" alt-text="Configure Notification":::
147152

148153
For more information about Event Grid notifications in Key Vault, see
149-
[Azure Key Vault as Event Grid source](/azure/event-grid/event-schema-key-vault?tabs=event-grid-event-schema)
154+
[Azure Key Vault as Event Grid source](/azure/event-grid/event-schema-key-vault?tabs=event-grid-event-schema).
150155

151-
## Configure key rotation with ARM template
156+
## Configure key rotation by using ARM template
152157

153-
Key rotation policy can also be configured using ARM templates.
158+
You can configure the key rotation policy by using ARM templates.
154159

155160
> [!NOTE]
156-
> It requires 'Key Vault Contributor' role on Key Vault configured with Azure RBAC to deploy key through control plane.
161+
> To deploy a key through the control plane, you need the **Key Vault Contributor** role on the Key Vault configured with Azure RBAC.
157162
158163
```json
159164
{
@@ -238,25 +243,25 @@ Key rotation policy can also be configured using ARM templates.
238243

239244
## Configure key rotation policy governance
240245

241-
Using the Azure Policy service, you can govern the key lifecycle and ensure that all keys are configured to rotate within a specified number of days.
246+
By using the Azure Policy service, you can govern the key lifecycle and ensure that all keys are configured to rotate within a specified number of days.
242247

243248
### Create and assign policy definition
244249

245-
1. Navigate to Policy resource
250+
1. Go to the Policy resource.
246251
1. Select **Assignments** under **Authoring** on the left side of the Azure Policy page.
247252
1. Select **Assign policy** at the top of the page. This button opens to the Policy assignment page.
248253
1. Enter the following information:
249-
- Define the scope of the policy by choosing the subscription and resource group over which the policy will be enforced. Select by clicking the three-dot button at on **Scope** field.
254+
- Define the scope of the policy by choosing the subscription and resource group over which the policy is enforced. Select by clicking the three-dot button at on **Scope** field.
250255
- Select the name of the policy definition: "[Keys should have a rotation policy ensuring that their rotation is scheduled within the specified number of days after creation.
251256
](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Fd8cf8476-a2ec-4916-896e-992351803c44)"
252257
- Go to the **Parameters** tab at the top of the page.
253258
- Set **The maximum days to rotate** parameter to desired number of days for example, 730.
254259
- Define the desired effect of the policy (Audit, or Disabled).
255-
1. Fill out any additional fields. Navigate the tabs clicking on **Previous** and **Next** buttons at the bottom of the page.
256-
1. Select **Review + create**
257-
1. Select **Create**
260+
1. Fill out any additional fields. Navigate the tabs by clicking on **Previous** and **Next** buttons at the bottom of the page.
261+
1. Select **Review + create**.
262+
1. Select **Create**.
258263

259-
Once the built-in policy is assigned, it can take up to 24 hours to complete the scan. After the scan is completed, you can see compliance results like below.
264+
After you assign the built-in policy, it can take up to 24 hours to complete the scan. When the scan finishes, you can see compliance results like the following.
260265

261266
:::image type="content" source="../media/keys/key-rotation/key-rotation-policy.png" alt-text="Screenshot of key rotation policy compliance." lightbox="../media/keys/key-rotation/key-rotation-policy.png":::
262267

0 commit comments

Comments
 (0)