%3CLINGO-SUB%20id%3D%22lingo-sub-1964625%22%20slang%3D%22en-US%22%3ETransparent%20Data%20Encryption%20with%20customer-managed%20keys%20for%20Azure%20SQL%20Hyperscale%20now%20available%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1964625%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fazure-sql%2Fdatabase%2Ftransparent-data-encryption-tde-overview%3Ftabs%3Dazure-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%3ETransparent%20data%20encryption%20(TDE)%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%3E%E2%80%AFin%20Azure%20SQL%20helps%20protect%20against%20the%20threat%20of%20malicious%20offline%20activity%20by%20encrypting%20data%20at%20rest.%3C%2FSPAN%3E%3CSPAN%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3CSPAN%3ECustomers%20using%20%3C%2FSPAN%3E%3CSPAN%3EAzure%20SQL%20Database%20%3C%2FSPAN%3E%3CSPAN%3EHyperscale%20can%20now%20use%20a%20key%20stored%20in%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fkey-vault%2Fgeneral%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Key%20Vault%20(AKV)%3C%2FA%3E%20as%20the%20TDE%20Protector%20for%20their%20server.%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EWhat%20new%20functionality%20is%20available%20as%20part%20of%20this%20announcement%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWith%20Bring%20Your%20Own%20Key%20(BYOK)%20support%20for%20TDE%20now%20available%20for%20Hyperscale%20databases%2C%20the%20TDE%20Protector%20that%20encrypts%20the%20Database%20Encryption%20Key%20can%20be%20stored%20in%20a%20customer-owned%20and%20managed%20Azure%20Key%20Vault%20(Azure's%20cloud-based%20external%20key%20management%20system).%20The%20TDE%20Protector%20can%20be%20generated%20in%20AKV%20or%20transferred%20to%20it%20from%20the%20customer%E2%80%99s%20on-premise%20security%20vault.%20The%20logical%20SQL%20server%20in%20Azure%20must%20be%20given%20to%20access%20the%20key%20stored%20in%20AKV.%3C%2FP%3E%0A%3CP%3EThe%20existing%20TDE%20with%20service-managed%20keys%20option%20will%20continue%20to%20be%20available%20and%20TDE%20encryption%20mode%20can%20be%20switched%20between%20service-managed%20or%20customer-managed%20keys.%3C%2FP%3E%0A%3CP%3ENote%20%E2%80%93%20TDE%20BYOK%20functionality%20is%20already%20available%20for%20other%20service%20tiers%20in%20Azure%20SQL.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22HS%20TDE%20BYOK%20GA.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F238507i22A3C9DBA0BB0F07%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22HS%20TDE%20BYOK%20GA.jpg%22%20alt%3D%22HS%20TDE%20BYOK%20GA.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorShoham%20Dasgupta_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3EWhat%20are%20the%20benefits%20provided%20by%20TDE%20BYOK%20for%20HyperScale%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSPAN%3ETDE%20with%20customer-managed%20keys%20improves%20on%20service-managed%20keys%20by%20%3C%2FSPAN%3E%3CSPAN%3Eenabling%20central%20management%20of%20keys%20in%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EAzure%20Key%20Vault%3C%2FSPAN%3E%3CSPAN%3E%2C%20giving%26nbsp%3Bcustomers%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Efull%26nbsp%3Band%20granular%20control%20over%20usage%20and%20management%20of%20the%20TDE%20protector%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3EUsers%20can%20control%20all%20key%20management%20tasks%20including%20key%20creation%2C%20upload%2C%20rotation%2C%20deletion%2C%20key%20usage%20permissions%2C%20key%20backups%2C%20along%20with%20enabling%20auditing%2Freporting%20of%20all%20operations%20performed%20on%20the%20TDE%20protectors%3C%2FLI%3E%0A%3CLI%3EOrganizations%20can%20use%20TDE%20BYOK%20to%20implement%20separation%20of%20duties%20between%20management%20of%20keys%20and%20data%20to%20help%20meet%20compliance%20with%20security%20policies%3C%2FLI%3E%0A%3CLI%3EAzure%20Key%20Vault%20(AKV)%20provides%20%3CSPAN%3Ea%20higher%20level%20of%20security%20assurance%20for%20government%20and%20financial%20customers%20and%20sensitive%20workloads%20via%20optional%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EFIPS%20140-2%20Level%202%20and%20Level%203%20validated%20hardware%20security%20modules%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESteps%20to%20enable%20TDE%20BYOK%20for%20a%20HyperScale%20database%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EBelow%20are%20the%20steps%20needed%20to%20enable%20TDE%20with%20customer-managed%20keys%20for%20Hyperscale%20database(s).%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EAssign%20Azure%20AD%20identity%20to%20your%20logical%20SQL%20server%20hosting%20the%20Hyperscale%20database%3C%2FLI%3E%0A%3CLI%3ECreate%20(or%20use%20existing)%20key%20vault%20and%20key.%20Refer%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fkey-vault%2Fkeys%2Fquick-create-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Etutorial%3C%2FA%3E%20for%20doing%20this%20through%20the%20Portal.%20Follow%20the%20requirements%20for%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Ftransparent-data-encryption-byok-overview%23requirements-for-configuring-akv%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Econfiguring%20AKV%3C%2FA%3E%20and%20for%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Ftransparent-data-encryption-byok-overview%23requirements-for-configuring-tde-protector%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETDE%20Protector%20keys%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EGrant%20permissions%20to%20your%20server%20to%20access%20the%20keys%20stored%20in%20Key%20Vault%3C%2FLI%3E%0A%3CLI%3EAdd%20the%20Key%20Vault%20key%20to%20the%20server%20and%20set%20it%20as%20the%20TDE%20protector.%20This%20updates%20the%20server%20to%20use%20TDE%20with%20customer-managed%20key.%3C%2FLI%3E%0A%3CLI%3ETurn%20on%20TDE%20for%20the%20HyperScale%20database%20(if%20not%20already%20enabled).%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EFor%20a%20comprehensive%20step-by-step%20tutorial%20on%20enabling%20TDE%20BYOK%20using%20Azure%20PowerShell%20or%20CLI%2C%20please%20refer%20our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Ftransparent-data-encryption-byok-configure%3Ftabs%3Dazure-powershell%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELearn%20More%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ETDE%20BYOK%20in%20Azure%20SQL%20-%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Ftransparent-data-encryption-byok-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Ftransparent-data-encryption-byok-overview%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EAzure%20SQL%20Hyperscale%20documentation%20-%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Fservice-tier-hyperscale%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-sql%2Fdatabase%2Fservice-tier-hyperscale%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EWe%20hope%20TDE%20BYOK%20will%20provide%20Hyperscale%20customers%20with%20an%20enhanced%20experience%20for%20managing%20the%20encryption%20at%20rest%20keys%20for%20their%20data.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1964625%22%20slang%3D%22en-US%22%3E%3CP%3ETDE%20with%20Bring%20Your%20Own%20Key%20support%20is%20now%20available%20for%20Azure%20SQL%20Database%20Hyperscale%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1964625%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20SQL%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Transparent data encryption (TDE) in Azure SQL helps protect against the threat of malicious offline activity by encrypting data at rest. Customers using Azure SQL Database Hyperscale can now use a key stored in Azure Key Vault (AKV) as the TDE Protector for their server.

 

What new functionality is available as part of this announcement

With Bring Your Own Key (BYOK) support for TDE now available for Hyperscale databases, the TDE Protector that encrypts the Database Encryption Key can be stored in a customer-owned and managed Azure Key Vault (Azure's cloud-based external key management system). The TDE Protector can be generated in AKV or transferred to it from the customer’s on-premise security vault. The logical SQL server in Azure must be given to access the key stored in AKV.

The existing TDE with service-managed keys option will continue to be available and TDE encryption mode can be switched between service-managed or customer-managed keys.

Note – TDE BYOK functionality is already available for other service tiers in Azure SQL.

 

HS TDE BYOK GA.jpg

 

What are the benefits provided by TDE BYOK for HyperScale

  • TDE with customer-managed keys improves on service-managed keys by enabling central management of keys in Azure Key Vault, giving customers full and granular control over usage and management of the TDE protector
  • Users can control all key management tasks including key creation, upload, rotation, deletion, key usage permissions, key backups, along with enabling auditing/reporting of all operations performed on the TDE protectors
  • Organizations can use TDE BYOK to implement separation of duties between management of keys and data to help meet compliance with security policies
  • Azure Key Vault (AKV) provides a higher level of security assurance for government and financial customers and sensitive workloads via optional FIPS 140-2 Level 2 and Level 3 validated hardware security modules

 

Steps to enable TDE BYOK for a HyperScale database

Below are the steps needed to enable TDE with customer-managed keys for Hyperscale database(s).

  1. Assign Azure AD identity to your logical SQL server hosting the Hyperscale database
  2. Create (or use existing) key vault and key. Refer this tutorial for doing this through the Portal. Follow the requirements for configuring AKV and for TDE Protector keys.
  3. Grant permissions to your server to access the keys stored in Key Vault
  4. Add the Key Vault key to the server and set it as the TDE protector. This updates the server to use TDE with customer-managed key.
  5. Turn on TDE for the HyperScale database (if not already enabled).

For a comprehensive step-by-step tutorial on enabling TDE BYOK using Azure PowerShell or CLI, please refer our documentation.

 

Learn More

We hope TDE BYOK will provide Hyperscale customers with an enhanced experience for managing the encryption at rest keys for their data.