Skip to content

Commit c7cd4ca

Browse files
msmbaldwinCopilot
andcommitted
Key Vault keys docset audit: fix FIPS levels, update SDKs, clean up stale content
- secure-keys.md: Fix FIPS compliance levels to match about-keys.md (FIPS 140-2 Level 3 → FIPS 140-3 Level 3 for Managed HSM; HSM-protected keys updated to reflect HSM Platform 2) - quick-create-java.md: Update Maven dependencies (azure-security-keyvault-keys 4.2.3 → 4.10.6, azure-identity 1.2.0 → 1.18.2) - quick-create-bicep.md, quick-create-template.md: Update Bicep/ARM API version from 2021-11-01-preview → 2024-11-01 - how-to-configure-key-rotation.md: Update ARM API version from 2021-06-01-preview → 2024-11-01 - javascript-developer-guide-get-started.md: Standardize placeholder YOUR-DIRECTORY → <your-directory> - hsm-protected-keys-ncipher.md: Reword stale deprecation warning (method no longer supported since June 2021, not future tense) - hsm-protected-keys-byok.md: Add missing Utimaco BYOK tool URL Co-authored-by: Copilot <[email protected]>
1 parent e4eeb04 commit c7cd4ca

8 files changed

Lines changed: 15 additions & 15 deletions

articles/key-vault/keys/how-to-configure-key-rotation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ You can configure the key rotation policy by using ARM templates.
205205
"resources": [
206206
{
207207
"type": "Microsoft.KeyVault/vaults/keys",
208-
"apiVersion": "2021-06-01-preview",
208+
"apiVersion": "2024-11-01",
209209
"name": "[concat(parameters('vaultName'), '/', parameters('keyName'))]",
210210
"location": "[resourceGroup().location]",
211211
"properties": {

articles/key-vault/keys/hsm-protected-keys-byok.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The following table lists prerequisites for using BYOK in Azure Key Vault:
6464
|Securosys SA|Manufacturer,<br/>HSM as a service|Primus HSM family, Securosys Clouds HSM|[Primus BYOK tool and documentation](https://www.securosys.com/primus-azure-byok)|
6565
|StorMagic|ISV (Enterprise Key Management System)|Multiple HSM brands and models including<ul><li>Utimaco</li><li>Thales</li><li>nCipher</li></ul>|See [StorMagic site for details](https://stormagic.com/doc/svkms/Content/Integrations/Azure_KeyVault_BYOK.htm). [SvKMS and Azure Key Vault BYOK](https://stormagic.com/doc/svkms/Content/Integrations/Azure_KeyVault_BYOK.htm)|
6666
|Thales|Manufacturer|<ul><li>Luna HSM 7 family with firmware version 7.3 or newer</li></ul>| [Luna BYOK tool and documentation](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=3892db6ddb8fc45005c9143b0b961987&sysparm_article=KB0021016)|
67-
|Utimaco|Manufacturer,<br/>HSM as a service|u.trust Anchor, CryptoServer| Utimaco BYOK tool and Integration guide |
67+
|Utimaco|Manufacturer,<br/>HSM as a service|u.trust Anchor, CryptoServer|[Utimaco BYOK tool and integration guide](https://utimaco.com/integration-guides/microsoft-azure-key-vault-byok-utimaco-securityserver)|
6868
|Yubico|Manufacturer|YubiHSM 2| [YubiHSM 2 BYOK User Guide for Azure](https://resources.yubico.com/53ZDUYE6/at/2rsrrspcftx4xkp8fn9nsgv/YubiHSM_2_BYOK_User_Guide_for_Azure.pdf?format=pdf) |
6969
||||
7070

articles/key-vault/keys/hsm-protected-keys-ncipher.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom: devx-track-azurepowershell
1717
# Import HSM-protected keys for Key Vault (nCipher)
1818

1919
> [!WARNING]
20-
> The HSM-key import method described in this document is **deprecated** and will not be supported after June 30, 2021. It only works with nCipher nShield family of HSMs with firmware 12.40.2 or newer. Using [new method to import HSM-keys](hsm-protected-keys-byok.md) is strongly recommended.
20+
> The HSM-key import method described in this document is **deprecated and no longer supported** (since June 30, 2021). It only works with nCipher nShield family of HSMs with firmware 12.40.2 or newer. Use the [current BYOK method to import HSM-keys](hsm-protected-keys-byok.md) instead.
2121
2222
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
2323

articles/key-vault/keys/javascript-developer-guide-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ This article shows you how to connect to Azure Key Vault by using the Azure Key
2626

2727
## Set up your project
2828

29-
1. Open a command prompt and change into your project folder. Change `YOUR-DIRECTORY` to your folder name:
29+
1. Open a command prompt and change into your project folder. Change `<your-directory>` to your folder name:
3030

3131
```bash
32-
cd YOUR-DIRECTORY
32+
cd <your-directory>
3333
```
3434

3535
1. If you don't have a `package.json` file already in your directory, initialize the project to create the file:

articles/key-vault/keys/quick-create-bicep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ param keySize int = 2048
6969
])
7070
param curveName string = ''
7171
72-
resource vault 'Microsoft.KeyVault/vaults@2021-11-01-preview' = {
72+
resource vault 'Microsoft.KeyVault/vaults@2024-11-01' = {
7373
name: vaultName
7474
location: location
7575
properties: {
@@ -92,7 +92,7 @@ resource vault 'Microsoft.KeyVault/vaults@2021-11-01-preview' = {
9292
}
9393
}
9494
95-
resource key 'Microsoft.KeyVault/vaults/keys@2021-11-01-preview' = {
95+
resource key 'Microsoft.KeyVault/vaults/keys@2024-11-01' = {
9696
parent: vault
9797
name: keyName
9898
properties: {

articles/key-vault/keys/quick-create-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,13 +100,13 @@ Open the *pom.xml* file in your text editor. Add the following dependency elemen
100100
<dependency>
101101
<groupId>com.azure</groupId>
102102
<artifactId>azure-security-keyvault-keys</artifactId>
103-
<version>4.2.3</version>
103+
<version>4.10.6</version>
104104
</dependency>
105105

106106
<dependency>
107107
<groupId>com.azure</groupId>
108108
<artifactId>azure-identity</artifactId>
109-
<version>1.2.0</version>
109+
<version>1.18.2</version>
110110
</dependency>
111111
```
112112

articles/key-vault/keys/quick-create-template.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: quickstart
1010
ms.custom: mvc, subject-armqs, mode-arm, devx-track-arm-template
11-
ms.date: 11/19/2025
11+
ms.date: 04/09/2026
1212

1313
ms.author: mbaldwin
1414
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure.
@@ -107,7 +107,7 @@ To complete this article:
107107
"resources": [
108108
{
109109
"type": "Microsoft.KeyVault/vaults",
110-
"apiVersion": "2021-11-01-preview",
110+
"apiVersion": "2024-11-01",
111111
"name": "[parameters('vaultName')]",
112112
"location": "[parameters('location')]",
113113
"properties": {
@@ -131,7 +131,7 @@ To complete this article:
131131
},
132132
{
133133
"type": "Microsoft.KeyVault/vaults/keys",
134-
"apiVersion": "2021-11-01-preview",
134+
"apiVersion": "2024-11-01",
135135
"name": "[format('{0}/{1}', parameters('vaultName'), parameters('keyName'))]",
136136
"properties": {
137137
"kty": "[parameters('keyType')]",

articles/key-vault/keys/secure-keys.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
77
ms.subservice: keys
88
ms.topic: best-practice
99
ms.custom: horz-security
10-
ms.date: 11/10/2025
10+
ms.date: 04/09/2026
1111
ms.author: mbaldwin
1212
ai-usage: ai-assisted
1313
# Customer intent: As a developer using Key Vault keys, I want to implement key-specific security best practices.
@@ -25,9 +25,9 @@ Azure Key Vault supports different key types with varying protection levels. Cho
2525

2626
- **Software-protected keys (RSA, EC)**: Keys protected by FIPS 140-2 Level 1 validated software. Suitable for most applications requiring encryption and signing operations.
2727

28-
- **HSM-protected keys (RSA-HSM, EC-HSM)**: Keys protected by FIPS 140-2 Level 2 validated hardware security modules (HSMs). Recommended for high-security scenarios requiring hardware-backed key protection.
28+
- **HSM-protected keys (RSA-HSM, EC-HSM)**: Keys protected by hardware security modules (HSMs). All new keys and key versions are created on FIPS 140-3 Level 3 validated HSMs (HSM Platform 2). Recommended for high-security scenarios requiring hardware-backed key protection.
2929

30-
- **Managed HSM keys**: Keys in dedicated, single-tenant HSM pools with FIPS 140-2 Level 3 validated hardware. Required for the highest security and compliance requirements.
30+
- **Managed HSM keys**: Keys in dedicated, single-tenant HSM pools with FIPS 140-3 Level 3 validated hardware. Required for the highest security and compliance requirements.
3131

3232
For more information about key types, see [About Azure Key Vault keys](about-keys.md).
3333

0 commit comments

Comments
 (0)