'OS and Data' disks should be encrypted with Customer Managed Key (CMK)
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Description
To enhance data security, it is important to ensure that both OS disks (boot volumes) and data disks (non-boot volumes) of IaaS VMs are encrypted using Customer Managed Keys (CMK). CMKs can be achieved through either Azure Disk Encryption (ADE) or Server Side Encryption (SSE).
Encrypting the OS disk and data disks with CMK ensures that the entire content can only be accessed with the corresponding key, preventing unauthorized access. While Azure-managed disks enable encryption at rest by default using Platform Managed Keys (PMKs), using CMK provides customers with the ability to have more control over the encryption and decryption processes, allowing for key rotation and increased security.
Organizations should evaluate their security requirements for the data stored on the disks. For high-risk data, the use of CMK is strongly recommended, as it offers additional layers of security. However, for low-risk data, PMK, which is enabled by default, provides sufficient data security.
From Azure Portal
Note: Disks must be detached from VMs to change encryption.
- Go to Virtual machines.
- For each virtual machine, go to Settings.
- Click on Disks.
- Click the ellipsis (…), then click Detach to detach the disk from the VM.
- Now search for Disks and locate the unattached disk.
- Click the disk then select Encryption.
- Change your encryption type, then select your encryption set.
- Click Save.
- Go back to the VM and re-attach the disk.