Skip to content

Commit d40e118

Browse files
Merge pull request #2689 from msmbaldwin/audit/managed-hsm-security-article
Audit and fix secure-managed-hsm security article
2 parents e9e1569 + 02125b5 commit d40e118

1 file changed

Lines changed: 21 additions & 16 deletions

File tree

articles/key-vault/managed-hsm/secure-managed-hsm.md

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
55
ms.author: mbaldwin
66
ms.service: security
77
ms.topic: best-practice
8-
ms.date: 03/13/2026
8+
ms.date: 03/31/2026
99
ms.custom: horz-security
1010
ai-usage: ai-assisted
1111

@@ -17,10 +17,10 @@ ai-usage: ai-assisted
1717

1818
Azure Managed HSM is a fully managed, highly available, single-tenant Hardware Security Module (HSM) service that provides FIPS 140-3 Level 3 validated cryptographic key protection for your cloud applications. Because Managed HSM safeguards your most sensitive cryptographic keys and secrets, implementing comprehensive security controls is essential to protect against threats and maintain business continuity.
1919

20-
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
21-
2220
This article provides security recommendations to help protect your Azure Managed HSM deployment.
2321

22+
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
23+
2424
## Service-specific security
2525

2626
Service-specific security addresses unique characteristics of Managed HSM, including hardware-level protection, FIPS compliance, and specialized cryptographic operations that distinguish it from other Azure services.
@@ -31,19 +31,19 @@ Service-specific security addresses unique characteristics of Managed HSM, inclu
3131

3232
- **Configure cross-region replication for business continuity**: Enable multiregion replication to extend your Managed HSM from a primary region to an extended region, providing active-active deployment with automated replication. Both regions can serve requests, and the Traffic Manager routes requests to the closest available region, increasing SLA to 99.99% combined. See [Multi-region replication](multi-region-replication.md).
3333

34-
## Data protection
34+
- **Control Azure Resource Manager key management access**: Managed HSM doesn't trust Azure Resource Manager by default, unlike standard Key Vault. If your environment requires portal-based or ARM template key management, explicitly enable the `AllowKeyManagementOperationsThroughARM` setting. Keep this setting disabled for higher-assurance environments where ARM trust is considered a risk. See [Allow key management operations through Azure Resource Manager](authorize-azure-resource-manager.md).
3535

36-
Data protection safeguards cryptographic keys and sensitive data stored in Managed HSM through encryption, key management policies, and secure storage practices. Proper data protection ensures key material remains confidential and tamper-resistant.
36+
## Network security
3737

38-
- **Implement multiperson control for security domain**: Configure a security domain quorum with multiple RSA key pairs (minimum three recommended) to prevent single-person control over HSM recovery. Specify a quorum threshold that requires multiple key holders to collaborate for security domain decryption, ensuring no single individual can compromise the HSM. See [Security domain overview](security-domain.md).
38+
Network security protects your Managed HSM through secure connectivity and network access controls. These network security features are listed from most restricted to least restricted capabilities. Pick the configuration that best suits your organization's use case. For detailed information about all network security configurations, see [Network security for Azure Key Vault Managed HSM](network-security.md).
3939

40-
- **Store security domain keys offline in secure locations**: Keep security domain private keys on encrypted, offline storage devices such as encrypted USB drives stored in separate geographical locations within physical safes or lock boxes. Never store security domain keys on internet-connected computers to reduce exposure to cyber threats and ensure air-gapped security. See [Security domain overview](security-domain.md).
40+
- **Disable public network access and use Private Endpoints only**: Deploy Azure Private Link to establish private, secured connectivity to your Managed HSM instance by creating a private endpoint in your virtual network. Disabling public network access prevents access from public IP addresses by configuring your Managed HSM to deny public network access. This configuration prevents exposure to the public internet and routes all traffic over the Microsoft backbone network. See [Integrate Managed HSM with Azure Private Link](private-link.md).
4141

42-
- **Establish security domain key management procedures**: Implement policies for periodic review of security domain key custody when personnel changes occur or when keys might be compromised. Document security domain holder responsibilities, maintain accurate records of key locations and custody, and ensure the quorum can be assembled for disaster recovery scenarios. See [Security domain overview](security-domain.md).
42+
- **Configure Managed HSM firewall with trusted services**: Configure Managed HSM firewall rules to deny public internet access while allowing specific trusted Azure services through the `--bypass AzureServices` setting when required by your scenario. This configuration restricts the attack surface while maintaining necessary service integrations. For full details, see [Network security: Managed HSM Firewall Enabled (Trusted Services)](network-security.md#managed-hsm-firewall-enabled-trusted-services).
4343

44-
- **Enable purge protection for HSM and keys**: Configure purge protection to prevent permanent deletion of the HSM or individual keys before the retention period expires. This control protects against accidental or malicious deletion and provides a recovery window for critical operations. See [Soft-delete overview](soft-delete-overview.md).
44+
- **Enable IP Network Firewall**: Limit access to public static IP addresses when network scenarios require controlled public access. For full details, see [Network security: Managed HSM Firewall Enabled (IP Network Firewall)](network-security.md#managed-hsm-firewall-enabled-ip-network-firewall).
4545

46-
- **Configure appropriate soft-delete retention periods**: Set soft-delete retention periods between 7 to 90 days based on your recovery requirements and compliance needs. Longer retention periods provide more recovery time but might conflict with data residency requirements. See [Soft-delete overview](soft-delete-overview.md).
46+
For step-by-step configuration instructions, see [How to configure Azure Managed HSM networking settings](configure-network-security.md).
4747

4848
## Identity and access management
4949

@@ -61,17 +61,21 @@ Identity and access management secures authentication and authorization to your
6161

6262
- **Separate control plane and data plane access**: Understand that control plane access (Azure RBAC) for managing HSM resources doesn't grant data plane access to keys. Explicitly assign data plane roles through Managed HSM local RBAC to users who need to perform key operations. See [Access control for Managed HSM](access-control.md).
6363

64-
## Network security
64+
## Data protection
6565

66-
Network security protects your Managed HSM through secure connectivity and network access controls. These network security features are listed from most restricted to least restricted capabilities. Pick the configuration that best suits your organization's use case. For detailed information about all network security configurations, see [Network security for Azure Key Vault Managed HSM](network-security.md).
66+
Data protection safeguards cryptographic keys and sensitive data stored in Managed HSM through encryption, key management policies, and secure storage practices. Proper data protection ensures key material remains confidential and tamper-resistant.
6767

68-
- **Disable public network access and use Private Endpoints only**: Deploy Azure Private Link to establish private, secured connectivity to your Managed HSM instance by creating a private endpoint in your virtual network. Disabling public network access prevents access from public IP addresses by configuring your Managed HSM to deny public network access. This configuration prevents exposure to the public internet and routes all traffic over the Microsoft backbone network. See [Integrate Managed HSM with Azure Private Link](private-link.md).
68+
- **Implement multiperson control for security domain**: Configure a security domain quorum with multiple RSA key pairs (minimum three recommended) to prevent single-person control over HSM recovery. Specify a quorum threshold that requires multiple key holders to collaborate for security domain decryption, ensuring no single individual can compromise the HSM. See [Security domain overview](security-domain.md).
6969

70-
- **Configure Managed HSM firewall with trusted services**: Configure Managed HSM firewall rules to deny public internet access while allowing specific trusted Azure services through the `--bypass AzureServices` setting when required by your scenario. This configuration restricts the attack surface while maintaining necessary service integrations. For full details, see [Network security: Managed HSM Firewall Enabled (Trusted Services)](network-security.md#managed-hsm-firewall-enabled-trusted-services).
70+
- **Store security domain keys offline in secure locations**: Keep security domain private keys on encrypted, offline storage devices such as encrypted USB drives stored in separate geographical locations within physical safes or lock boxes. Never store security domain keys on internet-connected computers to reduce exposure to cyber threats and ensure air-gapped security. See [Security domain overview](security-domain.md).
7171

72-
- **Enable IP Network Firewall**: Limit access to public static IP addresses when network scenarios require controlled public access. For full details, see [Network security: Managed HSM Firewall Enabled (IP Network Firewall)](network-security.md#managed-hsm-firewall-enabled-ip-network-firewall).
72+
- **Establish security domain key management procedures**: Implement policies for periodic review of security domain key custody when personnel changes occur or when keys might be compromised. Document security domain holder responsibilities, maintain accurate records of key locations and custody, and ensure the quorum can be assembled for disaster recovery scenarios. See [Security domain overview](security-domain.md).
7373

74-
For step-by-step configuration instructions, see [How to configure Azure Managed HSM networking settings](configure-network-security.md).
74+
- **Enable purge protection for HSM and keys**: Configure purge protection to prevent permanent deletion of the HSM or individual keys before the retention period expires. This control protects against accidental or malicious deletion and provides a recovery window for critical operations. See [Soft-delete overview](soft-delete-overview.md).
75+
76+
- **Configure appropriate soft-delete retention periods**: Set soft-delete retention periods between 7 to 90 days based on your recovery requirements and compliance needs. Longer retention periods provide more recovery time but might conflict with data residency requirements. See [Soft-delete overview](soft-delete-overview.md).
77+
78+
- **Configure automated key rotation**: Set up automated key rotation policies to regularly generate new key versions without manual intervention. Managed HSM supports both creation-based and expiration-based rotation triggers with a minimum rotation interval of 28 days. Automated key rotation helps meet cryptographic best practices that recommend rotating encryption keys at least every two years. See [Configure key autorotation in Azure Managed HSM](key-rotation.md).
7579

7680
## Logging and monitoring
7781

@@ -121,5 +125,6 @@ Backup and recovery protects against data loss and enables business continuity t
121125
- [Integrate with Azure Private Link](private-link.md)
122126
- [Managed HSM logging](logging.md)
123127
- [Integrate with Azure Policy](azure-policy.md)
128+
- [Configure key autorotation](key-rotation.md)
124129
- [Full backup and restore](backup-restore.md)
125130
- [Disaster recovery guide](disaster-recovery-guide.md)

0 commit comments

Comments
 (0)