How to configure Azure SQL Database Geo-DR with Azure Key Vault

%3CLINGO-SUB%20id%3D%22lingo-sub-181290%22%20slang%3D%22en-US%22%3EHow%20to%20configure%20Azure%20SQL%20Database%20Geo-DR%20with%20Azure%20Key%20Vault%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-181290%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20SQL%20Database%20and%20Data%20Warehouse%20offer%20encryption-at-rest%20by%20providing%20Transparent%20Data%20Encryption%20(TDE)%20for%20all%20data%20written%20to%20disk%2C%20including%20databases%2C%20log%20files%20and%20backups.%20This%20protects%20data%20in%20case%20of%20unauthorized%20access%20to%20hardware.%20TDE%20provides%20a%20TDE%20Protector%20that%20is%20used%20to%20encrypt%20the%20Database%20Encryption%20Key%20(DEK)%2C%20which%20in%20turn%20is%20used%20to%20encrypt%20the%20data.%20With%20the%20TDE%20and%20Bring%20Your%20Own%20Key%20(BYOK)%20offering%20currently%20in%20preview%2C%20customers%20can%20take%20control%20of%20the%20TDE%20Protector%20in%20Azure%20Key%20Vault.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETaking%20advantage%20of%20TDE%20with%20BYOK%20for%20databases%20that%20are%20geo-replicated%20to%20maintain%20high%20availability%20requires%20to%20configure%20and%20test%20the%20scenario%20carefully.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%226f81f172-b829-4ad1-919e-271ccac11284.png%22%20style%3D%22width%3A%20826px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F31898i0FC8521B3884EBE6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%226f81f172-b829-4ad1-919e-271ccac11284.png%22%20alt%3D%226f81f172-b829-4ad1-919e-271ccac11284.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERead%20more%20about%20it%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fhow-to-configure-azure-sql-database-geo-dr-with-azure-key-vault%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20blog%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-181290%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EData%20%26amp%3B%20Storage%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESQL%20Database%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Community Manager

Azure SQL Database and Data Warehouse offer encryption-at-rest by providing Transparent Data Encryption (TDE) for all data written to disk, including databases, log files and backups. This protects data in case of unauthorized access to hardware. TDE provides a TDE Protector that is used to encrypt the Database Encryption Key (DEK), which in turn is used to encrypt the data. With the TDE and Bring Your Own Key (BYOK) offering currently in preview, customers can take control of the TDE Protector in Azure Key Vault.

 

Taking advantage of TDE with BYOK for databases that are geo-replicated to maintain high availability requires to configure and test the scenario carefully. 

 

6f81f172-b829-4ad1-919e-271ccac11284.png

 

Read more about it in the Azure blog.

0 Replies