%3CLINGO-SUB%20id%3D%22lingo-sub-1445971%22%20slang%3D%22en-US%22%3EPreview%20-%20Data%20encryption%20using%20customer%20managed%20key%20for%20Azure%20Database%20for%20MySQL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1445971%22%20slang%3D%22en-US%22%3E%3CP%3EWith%20the%20growth%20in%20the%20cloud%20transformation%20by%20organizations%20globally%2C%20there%20is%20a%20growing%20concern%20of%20the%20security%20and%20control%20of%20the%20data%20stored%20in%20cloud.%20Until%20now%2C%20Azure%20Database%20for%20MySQL%20encrypted%20all%20data%20at%20rest%20using%20Azure%20managed%20key.%20However%2C%20customers%20wanted%20more%20control%20of%20this%20security%20and%20manage%20their%20resources%20based%20on%20the%20organizations%20policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%20help%20solve%20this%20problem%2C%20we%20are%20excited%20to%20announce%20the%20%3CSTRONG%3Epreview%3C%2FSTRONG%3E%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fconcepts-data-encryption-mysql%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EData%20encryption%20using%20customer%20managed%20key%3C%2FA%3E%20support%20for%20the%20Azure%20database%20for%20MySQL.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOften%20referred%20to%20as%20%3CEM%3EBring%20your%20own%20key%20(BYOK)%3C%2FEM%3E%2C%20this%20functionality%20lets%20you%20create%2C%20own%2C%20and%20manage%20encryption%20for%20their%20data%20at%20rest%20for%20your%20Azure%20Database%20for%20MySQL.%20You%20are%20responsible%20for%2C%20and%20in%20a%20full%20control%20of%2C%20the%20key's%20lifecycle%2C%20key%20usage%20permissions%2C%20and%20auditing%20of%20operations%20on%20keys.%20Now%2C%20you%20can%20use%20customer%20managed%20key%20to%20help%20protect%20your%20data%2C%20comply%20to%20your%20organization%E2%80%99s%20policies%2C%20and%20meet%20regulatory%20requirements.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1326611797%22%20id%3D%22toc-hId--1326611797%22%3E%3CSTRONG%3EUnderstanding%20the%20key%20terminologies%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EData%20encryption%20key%20(DEK)%3C%2FSTRONG%3E%3A%20A%20symmetric%20AES256%20key%20used%20to%20encrypt%20a%20partition%20or%20block%20of%20data.%20Encrypting%20each%20block%20of%20data%20with%20a%20different%20key%20makes%20crypto%20analysis%20attacks%20more%20difficult.%20Access%20to%20DEKs%20is%20needed%20by%20the%20resource%20provider%20or%20application%20instance%20that%20is%20encrypting%20and%20decrypting%20a%20specific%20block.%20When%20you%20replace%20a%20DEK%20with%20a%20new%20key%2C%20only%20the%20data%20in%20its%20associated%20block%20must%20be%20re-encrypted%20with%20the%20new%20key.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EKey%20encryption%20key%20(KEK)%3C%2FSTRONG%3E%3A%20An%20encryption%20key%20used%20to%20encrypt%20the%20DEKs.%20A%20KEK%20that%20never%20leaves%20Key%20Vault%20allows%20the%20DEKs%20themselves%20to%20be%20encrypted%20and%20controlled.%20The%20entity%20that%20has%20access%20to%20the%20KEK%20might%20be%20different%20than%20the%20entity%20that%20requires%20the%20DEK.%20Since%20the%20KEK%20is%20required%20to%20decrypt%20the%20DEKs%2C%20the%20KEK%20is%20effectively%20a%20single%20point%20by%20which%20DEKs%20can%20be%20effectively%20deleted%20by%20deletion%20of%20the%20KEK.%3C%2FP%3E%0A%3CP%3EThe%20DEKs%2C%20encrypted%20with%20the%20KEKs%2C%20are%20stored%20separately.%20Only%20an%20entity%20with%20access%20to%20the%20KEK%20can%20decrypt%20these%20DEKs.%20For%20more%20information%2C%20see%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Ffundamentals%2Fencryption-atrest%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESecurity%20in%20encryption%20at%20rest%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1160901036%22%20id%3D%22toc-hId-1160901036%22%3E%3CSTRONG%3EHow%20data%20encryption%20with%20a%20customer-managed%20key%20works%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22mysqloverview.png%22%20style%3D%22width%3A%20583px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F197075iBD06C922002942E3%2Fimage-dimensions%2F583x352%3Fv%3D1.0%22%20width%3D%22583%22%20height%3D%22352%22%20title%3D%22mysqloverview.png%22%20alt%3D%22mysqloverview.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20order%20to%20use%20encryption%20using%20for%20your%20Azure%20Database%20for%20MySQL%20using%20customer-managed%20keys%20stored%20in%20Key%20Vault%2C%20a%20Key%20Vault%20administrator%20gives%20the%20necessary%20permissions%20to%20the%20server%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3Eget%3C%2FSTRONG%3E%3A%20For%20retrieving%20the%20public%20part%20and%20properties%20of%20the%20key%20in%20the%20key%20vault.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EwrapKey%3C%2FSTRONG%3E%3A%20To%20be%20able%20to%20encrypt%20the%20DEK.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EunwrapKey%3C%2FSTRONG%3E%3A%20To%20be%20able%20to%20decrypt%20the%20DEK.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThe%20key%20vault%20administrator%20can%20also%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Finsights%2Fazure-key-vault%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%20data-linktype%3D%22relative-path%22%3Eenable%20logging%20of%20Key%20Vault%20audit%20events%3C%2FA%3E%2C%20so%20they%20can%20be%20audited%20later.%26nbsp%3BWhen%20the%20server%20is%20configured%20to%20use%20the%20customer-managed%20key%20stored%20in%20the%20key%20vault%2C%20the%20server%20sends%20the%20DEK%20to%20the%20key%20vault%20for%20encryption.%20Key%20Vault%20returns%20the%20encrypted%20DEK%2C%20which%20is%20stored%20in%20the%20user%20database.%20Similarly%2C%20when%20needed%2C%20the%20server%20sends%20the%20protected%20DEK%20to%20the%20key%20vault%20for%20decryption.%20Auditors%20can%20use%20Azure%20Monitor%20to%20review%20Key%20Vault%20audit%20event%20logs%2C%20if%20logging%20is%20enabled.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--646553427%22%20id%3D%22toc-hId--646553427%22%3EBenefits%20of%20using%20encryption%20using%20customer%26nbsp%3Bmanaged%20keys%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EData%20encryption%20using%20customer%20managed%20key%20for%20Azure%20Database%20for%20MySQL%20provides%20the%20following%20benefits%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EGreater%20trust%20from%20end%20customers%20since%20data-access%20is%20fully%20controlled%20by%20them%20and%20the%20ability%20to%20remove%20the%20key%20and%20making%20the%20database%20inaccessible%3C%2FLI%3E%0A%3CLI%3EFull%20control%20over%20the%20key-lifecycle%2C%20including%20rotation%20of%20the%20key%20to%20align%20with%20corporate%20policies%3C%2FLI%3E%0A%3CLI%3ECentral%20management%20and%20organization%20of%20keys%20in%20Azure%20Key%20Vault%3C%2FLI%3E%0A%3CLI%3EAbility%20to%20implement%20separation%20of%20duties%20between%20security%20officers%2C%20and%20DBA%20and%20system%20administrators%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1840959406%22%20id%3D%22toc-hId-1840959406%22%3EHow%20to%20use%20customer%20managed%20key%20encryption%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20process%20of%20enabling%20encryption%20for%20your%20Azure%20database%20for%20MySQL%20is%20seamless%20and%20does%20not%20require%20downtime%2C%20and%20it%20does%20not%20degrade%20performance.%20You%20can%20use%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fhowto-data-encryption-portal%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20portal%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fhowto-data-encryption-cli%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20CLI%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fhowto-data-encryption-cli%23using-an-azure-resource-manager-template-to-enable-data-encryption%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EARM%20templates%3C%2FA%3E%20for%20perform%20this%20operation.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EOnce%20set%20you%20can%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fhowto-data-encryption-validation%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Everify%20the%20data%20encryption%3C%2FA%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-33504943%22%20id%3D%22toc-hId-33504943%22%3ELimitations%20of%20encryption%20using%20customer%20managed%20keys%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20Azure%20Database%20for%20MySQL%2C%20the%20support%20for%20encryption%20of%20data%20at%20rest%20using%20customers%20managed%20key%20(CMK)%20has%20some%20limitation%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ESupport%20for%20this%20functionality%20is%20limited%20to%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EGeneral%20Purpose%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eand%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EMemory%20Optimized%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eservers.%3C%2FLI%3E%0A%3CLI%3EThis%20feature%20is%20only%20supported%20in%20regions%20and%20servers%20which%20support%20storage%20up%20to%2016TB.%20Refer%20to%20the%20current%20list%20of%20regions%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fconcepts-pricing-tiers%23storage%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%20data-linktype%3D%22relative-path%22%3Ehere%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EEncryption%20is%20only%20supported%20with%20RSA%202048%20cryptographic%20key.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1773949520%22%20id%3D%22toc-hId--1773949520%22%3ELearn%20more%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EYou%20can%20find%20more%20details%20on%20the%20Data%20encryption%20for%20Azure%20Database%20for%20MySQL%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fmysql%2Fconcepts-data-encryption-mysql%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%26nbsp%3BYou%20can%20give%20the%20Azure%20Data%20encryption%20using%20customer%20managed%20key%20a%20try%20today.%20This%20functionality%20is%20still%20in%20preview%20and%20should%20not%20be%20used%20for%20production%20workloads.%20If%20you%20have%20questions%2C%20please%20reach%20out%20to%20us%20AskAzureDBforMySQL%40service.microsoft.com%20alias.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1445971%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20announcing%20the%20%3CSTRONG%3Epreview%3C%2FSTRONG%3E%20of%20encryption%20using%20customer%20managed%20key%26nbsp%3B(%3CSTRONG%3EB%3C%2FSTRONG%3Ering%20%3CSTRONG%3EY%3C%2FSTRONG%3Eour%20%3CSTRONG%3EO%3C%2FSTRONG%3Ewn%20%3CSTRONG%3EK%3C%2FSTRONG%3Eey)%20support%20for%20the%20Azure%20database%20for%20MySQL.%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

With the growth in the cloud transformation by organizations globally, there is a growing concern of the security and control of the data stored in cloud. Until now, Azure Database for MySQL encrypted all data at rest using Azure managed key. However, customers wanted more control of this security and manage their resources based on the organizations policies.

 

Today help solve this problem, we are excited to announce the preview of Data encryption using customer managed key support for the Azure database for MySQL.

 

Often referred to as Bring your own key (BYOK), this functionality lets you create, own, and manage encryption for their data at rest for your Azure Database for MySQL. You are responsible for, and in a full control of, the key's lifecycle, key usage permissions, and auditing of operations on keys. Now, you can use customer managed key to help protect your data, comply to your organization’s policies, and meet regulatory requirements.

 

Understanding the key terminologies

 

Data encryption key (DEK): A symmetric AES256 key used to encrypt a partition or block of data. Encrypting each block of data with a different key makes crypto analysis attacks more difficult. Access to DEKs is needed by the resource provider or application instance that is encrypting and decrypting a specific block. When you replace a DEK with a new key, only the data in its associated block must be re-encrypted with the new key.

 

Key encryption key (KEK): An encryption key used to encrypt the DEKs. A KEK that never leaves Key Vault allows the DEKs themselves to be encrypted and controlled. The entity that has access to the KEK might be different than the entity that requires the DEK. Since the KEK is required to decrypt the DEKs, the KEK is effectively a single point by which DEKs can be effectively deleted by deletion of the KEK.

The DEKs, encrypted with the KEKs, are stored separately. Only an entity with access to the KEK can decrypt these DEKs. For more information, see Security in encryption at rest.

 

How data encryption with a customer-managed key works

 

mysqloverview.png

 

In order to use encryption using for your Azure Database for MySQL using customer-managed keys stored in Key Vault, a Key Vault administrator gives the necessary permissions to the server:

 

  • get: For retrieving the public part and properties of the key in the key vault.
  • wrapKey: To be able to encrypt the DEK.
  • unwrapKey: To be able to decrypt the DEK.

The key vault administrator can also enable logging of Key Vault audit events, so they can be audited later. When the server is configured to use the customer-managed key stored in the key vault, the server sends the DEK to the key vault for encryption. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, the server sends the protected DEK to the key vault for decryption. Auditors can use Azure Monitor to review Key Vault audit event logs, if logging is enabled.

 

Benefits of using encryption using customer managed keys

 

Data encryption using customer managed key for Azure Database for MySQL provides the following benefits

 

  • Greater trust from end customers since data-access is fully controlled by them and the ability to remove the key and making the database inaccessible
  • Full control over the key-lifecycle, including rotation of the key to align with corporate policies
  • Central management and organization of keys in Azure Key Vault
  • Ability to implement separation of duties between security officers, and DBA and system administrators

 

How to use customer managed key encryption

 

The process of enabling encryption for your Azure database for MySQL is seamless and does not require downtime, and it does not degrade performance. You can use Azure portal, Azure CLI and ARM templates for perform this operation. Once set you can verify the data encryption.

 

Limitations of encryption using customer managed keys

 

For Azure Database for MySQL, the support for encryption of data at rest using customers managed key (CMK) has some limitation 

  • Support for this functionality is limited to General Purpose and Memory Optimized servers.
  • This feature is only supported in regions and servers which support storage up to 16TB. Refer to the current list of regions here
  • Encryption is only supported with RSA 2048 cryptographic key.

 

Learn more


You can find more details on the Data encryption for Azure Database for MySQL here. You can give the Azure Data encryption using customer managed key a try today. This functionality is still in preview and should not be used for production workloads. If you have questions, please reach out to us AskAzureDBforMySQL@service.microsoft.com alias.