Storage for critical data should be encrypted with Customer Managed Key

Warning: This rule will be deprecated 18 December 2023 as part of the update to Azure CIS version 2.0.0


Enable sensitive data encryption at rest using customer managed keys rather than Microsoft managed keys.


By default, data in the storage account is encrypted using Microsoft managed keys at rest. All Azure Storage resources are encrypted, including blobs, disks, files, queues, and tables. All object metadata is also encrypted. However, if you want to control and manage the encryption key yourself, you can specify a customer-managed key, and that key is used to protect and control access to the key that encrypts your data. You can also choose to automatically update the key version used for Azure Storage encryption whenever a new version is available in the associated key vault.


From the console

  1. Go to Storage Accounts
  2. For each storage account, go to Encryption
  3. Set Customer Managed Keys
  4. Select the encryption key and enter the appropriate setting value
  5. Click Save


If the key expires by setting the activation date and expiration date of the key, you must rotate the key manually. Using customer managed keys may also incur additional effort to create, store, manage, and protect the keys as needed.



CIS Controls

Version 7 14.8 - Encrypt Sensitive Information at Rest - Encrypt all sensitive information at rest using a tool that requires a secondary authentication mechanism not integrated into the operating system, in order to access the information.