Announcing General Availability of Bring Your Own Keys(BYOK) for Encryption at Rest on Service Bus

Published 02-09-2020 09:00 PM 1,407 Views
Microsoft

One of the biggest security and compliance requirements for enterprise customers is to encrypt their data at rest using their own encryption key. This is even more critical in a post-GDPR world. In that spirit, we’re happy to announce general availability of encryption using customer managed key (BYOK) for data at rest in Azure Service Bus.

 

The message payload data in Azure Service Bus has always been encrypted - whether in transit using TLS or at rest, using a service managed key. However, for some customers it is vital that they own and manage the keys used to encrypt the data at rest. In the past, customers have achieved this by encrypting all messages in their sender applications and decrypting them in their receiver applications. This process is cumbersome and involves custom logic.

With the extension to encrypt the data using customer managed key, the service provides a simplified experience while giving the customer better control on how the data is stored and what applications/users have access to it.

 

To enable encryption at rest with customer managed key, customers should use a managed service identity to setup an access policy on Azure KeyVault that contains the keys. Customers must also enable Soft-delete and purge protection for customer managed keys that help protect them against ransomware scenarios and accidental deletion. The entire setup is transparent to the client applications and no code or configuration changes are needed to send or receive messages from a BYOK enabled Service Bus namespace. 

 

With customer managed key encryption on Azure Service Bus, enterprise customers can now be more confident than ever in the security of their data. This feature unlocks cloud native enterprise messaging for customers for whom BYOK is a prerequisite for data at rest. There feature is available at no extra charge.

 

To get started with encryption at rest using a customer managed key, please review the below documentation -

Encryption at rest using customer managed key (BYOK)

%3CLINGO-SUB%20id%3D%22lingo-sub-1163374%22%20slang%3D%22en-US%22%3EAnnouncing%20General%20Availability%20of%20Bring%20Your%20Own%20Keys(BYOK)%20for%20Encryption%20at%20Rest%20on%20Service%20Bus%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1163374%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EOne%20of%20the%20biggest%20security%20and%20compliance%20requirements%20for%20enterprise%20customers%20is%20to%20encrypt%20their%20data%20at%20rest%20using%20their%20own%20encryption%20key.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EThis%20is%20even%20more%20critical%20in%20a%20post-GDPR%20world.%20In%20that%20spirit%2C%20we%E2%80%99re%20happy%20to%20announce%20general%20availability%26nbsp%3Bof%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fservice-bus-messaging%2Fconfigure-customer-managed-key%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%20data-event%3D%22page-clicked-link%22%20data-bi-id%3D%22page-clicked-link%22%20data-bi-area%3D%22content%22%3Eencryption%20using%20customer%20managed%20key%20(BYOK)%3C%2FA%3E%3CSPAN%3E%26nbsp%3Bfor%20data%20at%20rest%20in%20Azure%20Service%20Bus%3C%2FSPAN%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20message%20payload%20data%20in%20Azure%20Service%20Bus%20has%20always%20been%20encrypted%20-%20whether%20in%20transit%20using%20TLS%20or%20at%20rest%2C%20using%20a%20service%20managed%20key.%26nbsp%3BHowever%2C%20for%20some%20customers%20it%20is%20vital%20that%20they%20own%20and%20manage%20the%20keys%20used%20to%20encrypt%20the%20data%20at%20rest.%20In%20the%20past%2C%20customers%20have%20achieved%20this%20by%20encrypting%20all%20messages%20in%20their%20sender%20applications%20and%20decrypting%20them%20in%20their%20receiver%20applications.%20This%20process%20is%20cumbersome%20and%20involves%20custom%20logic.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWith%20the%20extension%20to%20encrypt%20the%20data%20using%20customer%20managed%20key%2C%20the%20service%20provides%20a%20simplified%20experience%20while%20giving%20the%20customer%20better%20control%20on%20how%20the%20data%20is%20stored%20and%20what%20applications%2Fusers%20have%20access%20to%20it.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ETo%20enable%20encryption%20at%20rest%20with%20customer%20managed%20key%2C%20customers%20should%20use%20a%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fservice-bus-messaging%2Fservice-bus-managed-service-identity%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Emanaged%20service%20identity%3C%2FA%3E%26nbsp%3Bto%20setup%20an%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fkey-vault%2Fkey-vault-secure-your-key-vault%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%20data-linktype%3D%22relative-path%22%3Eaccess%20policy%3C%2FA%3E%26nbsp%3Bon%20Azure%20KeyVault%20that%20contains%20the%20keys.%26nbsp%3BCustomers%20must%20also%20enable%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fkey-vault%2Fkey-vault-ovw-soft-delete%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%20data-event%3D%22page-clicked-link%22%20data-bi-id%3D%22page-clicked-link%22%20data-bi-area%3D%22content%22%3ESoft-delete%3C%2FA%3E%26nbsp%3Band%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fkey-vault%2Fkey-vault-ovw-soft-delete%23purge-protection%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Epurge%20protection%3C%2FA%3E%20for%20customer%20managed%20keys%20that%20help%20protect%20them%20against%20ransomware%20scenarios%20and%20accidental%20deletion.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EThe%20entire%20setup%20is%20transparent%20to%20the%20client%20applications%20and%20no%20code%20or%20configuration%20changes%20are%20needed%20to%20send%20or%20receive%20messages%20from%20a%20BYOK%20enabled%20Service%20Bus%20namespace.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWith%20customer%20managed%20key%20encryption%20on%20Azure%20Service%20Bus%2C%20enterprise%20customers%20can%20now%20be%20more%20confident%20than%20ever%20in%20the%20security%20of%20their%20data.%20This%20feature%20unlocks%20cloud%20native%20enterprise%20messaging%20for%20customers%20for%20whom%20BYOK%20is%20a%20prerequisite%20for%20data%20at%20rest.%20There%20feature%20is%20available%20at%20no%20extra%20charge.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ETo%20get%20started%20with%20encryption%20at%20rest%20using%20a%20customer%20managed%20key%2C%20please%20review%20the%20below%20documentation%20-%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fservice-bus-messaging%2Fconfigure-customer-managed-key%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%3EEncryption%20at%20rest%20using%20customer%20managed%20key%20(BYOK)%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1163374%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Service%20Bus%20now%20allows%20customers%20to%20better%20control%20how%20their%20data%20is%20stored%20and%20who%20can%20access%20it%20by%20supporting%20service%20side%20encryption%20with%20customer%20managed%20keys.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1163374%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Eazure%20service%20bus%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jul 08 2020 01:02 PM
Updated by: