Storage Service Encryption using customer-managed keys in Azure Key Vault
Microsoft Azure is committed to helping you protect and safeguard your data to meet your organizational security and compliance commitments. One way that Azure Storage protects your data is via Storage Service Encryption (SSE), which encrypts your data when writing it to storage, and decrypts your data when retrieving it. The encryption and decryption is automatic, transparent, and uses 256-bit AES encryption, one of the strongest block ciphers available.
You can use Microsoft-managed encryption keys with SSE or you can use your own encryption keys. This article describes how to use your own encryption keys. For more information about using Microsoft-managed keys, or about SSE in general, see Storage Service Encryption for Data at Rest.
SSE for Blob and File storage is integrated with Azure Key Vault, so that you can use a key vault to manage your encryption keys. You can create your own encryption keys and store them in a key vault, or you can use Azure Key Vault’s APIs to generate encryption keys. With Azure Key Vault, you can manage and control your keys and also audit your key usage.
Why create your own keys? Custom keys give you more flexibility, so that you can create, rotate, disable, and define access controls. Custom keys also enable you to audit the encryption keys used to protect your data.
Get started with customer-managed keys
To use customer-managed keys with SSE, you can either create a new key vault and key or you can use an existing key vault and key. The storage account and the key vault must be in the same region, but they can be in different subscriptions.
Step 1: Create a storage account
First, create a storage account if you don't have one already. For more information, see Create a new storage account.
Step 2: Enable SSE for Blob and File storage
To enable SSE using customer-managed keys, two key protection features, Soft Delete and Do Not Purge, must also be enabled. These settings ensure the keys cannot be accidently or intentionally deleted. The maximum retention period of the keys is set to 90 days, protecting users against malicious actors or ransomware attacks.
If you want to programmatically enable customer-managed keys for SSE, you can use the Azure Storage Resource Provider REST API, the Storage Resource Provider Client Library for .NET, Azure PowerShell, or the Azure CLI.
To use customer-managed keys with SSE, you must assign a storage account identity to the storage account. You can set the identity by executing the following PowerShell command:
Set-AzureRmStorageAccount -ResourceGroupName \$resourceGroup -Name \$accountName -AssignIdentity
You can enable Soft Delete and Do Not Purge by executing the following PowerShell commands:
($resource = Get-AzureRmResource -ResourceId (Get-AzureRmKeyVault -VaultName $vaultName).ResourceId).Properties | Add-Member -MemberType NoteProperty -Name enableSoftDelete -Value 'True' Set-AzureRmResource -resourceid $resource.ResourceId -Properties $resource.Properties ($resource = Get-AzureRmResource -ResourceId (Get-AzureRmKeyVault -VaultName $vaultName).ResourceId).Properties | Add-Member -MemberType NoteProperty -Name enablePurgeProtection -Value 'True' Set-AzureRmResource -resourceid $resource.ResourceId -Properties $resource.Properties
Step 3: Enable encryption with customer-managed keys
By default, SSE uses Microsoft-managed keys. You can enable SSE with customer-managed keys for the storage account using the Azure portal. On the Settings blade for the storage account, click Encryption. Select the Use your own key option, as shown in the following figure.
Step 4: Select your key
You can specify your key either as a URI, or by selecting the key from a key vault.
Specify a key as a URI
To specify your key from a URI, follow these steps:
- Choose the Enter key URI option.
In the Key URI field, specify the URI.
Specify a key from a key vault
To specify your key from a key vault, follow these steps:
- Choose the Select from Key Vault option.
- Choose the key vault containing the key you want to use.
Choose the key from the key vault.
If the storage account does not have access to the key vault, you can run the Azure PowerShell command shown in the following image to grant access.
You can also grant access via the Azure portal by navigating to the Azure Key Vault in the Azure portal and granting access to the storage account.
You can associate the above key with an existing storage account using the following PowerShell commands:
$storageAccount = Get-AzureRmStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" $keyVault = Get-AzureRmKeyVault -VaultName "mykeyvault" $key = Get-AzureKeyVaultKey -VaultName $keyVault.VaultName -Name "keytoencrypt" Set-AzureRmKeyVaultAccessPolicy -VaultName $keyVault.VaultName -ObjectId $storageAccount.Identity.PrincipalId -PermissionsToKeys wrapkey,unwrapkey,get Set-AzureRmStorageAccount -ResourceGroupName $storageAccount.ResourceGroupName -AccountName $storageAccount.StorageAccountName -EnableEncryptionService "Blob" -KeyvaultEncryption -KeyName $key.Name -KeyVersion $key.Version -KeyVaultUri $keyVault.VaultUri
Step 5: Copy data to storage account
To transfer data into your new storage account so that it’s encrypted, refer to Step 3 of Getting Started in Storage Service Encryption for Data at Rest.
Step 6: Query the status of the encrypted data
To query the status of the encrypted data, refer to Step 4 of Getting Started in Storage Service Encryption for Data at Rest.
FAQ for SSE with customer-managed-keys
Q: I'm using Premium storage; can I use customer-managed keys with SSE?
A: Yes, SSE with Microsoft-managed and customer-managed keys is supported on both Standard storage and Premium storage.
Q: Can I create new storage accounts with SSE with customer-managed keys enabled using Azure PowerShell and Azure CLI?
Q: How much more does Azure Storage cost if I use customer-managed keys with SSE?
A: There is a cost associated for using Azure Key Vault. For more details, visit Key Vault Pricing. There is no additional cost for SSE, which is enabled for all storage accounts.
Q: Can I revoke access to the encryption keys?
A: Yes, you can revoke access at any time. There are several ways to revoke access to your keys. Refer to Azure Key Vault PowerShell and Azure Key Vault CLI for more details. Revoking access will effectively block access to all blobs in the storage account as the account encryption key is inaccessible by Azure Storage.
Q: Can I create a storage account and key in different region?
A: No, the storage account and the Azure Key Vault and key need to be in the same region.
Q: Can I enable customer-managed keys for SSE while creating the storage account?
A: No. When you first create the storage account, only Microsoft-managed keys are available for SSE. To use customer-managed keys, you must update the storage account properties. You can use REST or one of the storage client libraries to programmatically update your storage account, or update the storage account properties using the Azure portal after creating the account.
Q: Can I disable encryption while using customer-managed keys with SSE?
A: No, you cannot disable encryption. Encryption is enabled by default for all services – Blob, File, Table and Queue storage. You can optionally switch from using Microsoft-managed keys to using customer-managed keys, and vice versa.
Q: Is SSE enabled by default when I create a new storage account?
A: SSE is enabled by default for all storage accounts and for all services – Blob, File, Table, and Queue storage.
Q: I can't enable SSE using customer-managed keys on my storage account.
A: Is it an Azure Resource Manager storage account? Classic storage accounts are not supported with customer-managed keys. SSE with customer-managed keys can only be enabled on Resource Manager storage accounts.
Q: What is Soft Delete and Do Not Purge? Do I need to enable this setting to use SSE with customer-managed keys?
A: Soft Delete and Do Not Purge must be enabled to use SSE with customer-managed keys. These settings ensure that your key is not accidently or intentionally deleted. The maximum retention period of the keys is set to 90 days, protecting users against malicious actors and ransomware attacks. This setting cannot be disabled.
Q: Is SSE with customer-managed keys only permitted in specific regions?
A: SSE with customer-managed keys is available in all regions for Blob and File storage.
Q: How do I contact someone if I have any issues or want to provide feedback?
A: Contact firstname.lastname@example.org for any issues related to Storage Service Encryption.
For more information on the comprehensive set of security capabilities that help developers build secure applications, see the Storage Security Guide.
For overview information about Azure Key Vault, see What is Azure Key Vault?
For getting started on Azure Key Vault, see Getting Started with Azure Key Vault.