Source | Azure Portal | |||||||||||||||||||||
Display name | [Deprecated]: SQL managed instances should use customer-managed keys to encrypt data at rest | |||||||||||||||||||||
Id | 048248b0-55cd-46da-b1ff-39efd52db260 | |||||||||||||||||||||
Version | 1.0.2-deprecated Details on versioning |
|||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.2 (1.0.2-deprecated) Built-in Versioning [Preview] |
|||||||||||||||||||||
Category | SQL Microsoft Learn |
|||||||||||||||||||||
Description | This policy is deprecated. Please use /providers/Microsoft.Authorization/policyDefinitions/ac01ad65-10e5-46df-bdd9-6b0cad13e1d2 instead | |||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
|||||||||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | |||||||||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: 06ac6ef4-1e66-1334-5418-6e79ab444ce0 DisplayName: [Enable if required] SQL managed instances should use customer-managed keys to encrypt data at rest Description: Using customer-managed keys for encrypting data at rest provides increased transparency, control over the TDE Protector, enhanced security with an HSM-backed external service, and promotes separation of duties. This is not assessed by default and should only be applied when required by compliance or restrictive policy requirements. If not enabled, the data will be encrypted using platform-managed keys. This is particularly relevant for organizations with related compliance requirements. Remediation description: To configure your own encryption key for SQL Server Transparent Data encryption: 1. Select the SQL server. 2. On the Transparent data encryption page, select Customer-managed key. 3. For Key selection method, choose Select a key or Enter a key identifier if you have one. 4. If you chose Select a key, configure the desired Key vault and Key. For more information, see this article: https://docs.microsoft.com/azure/sql-database/transparent-data-encryption-byok-azure-sql Categories: Data Severity: Low preview: True |
|||||||||||||||||||||
Mode | Indexed | |||||||||||||||||||||
Type | BuiltIn | |||||||||||||||||||||
Preview | False | |||||||||||||||||||||
Deprecated | True | |||||||||||||||||||||
Reference |
Reference to 1 related Policy definition (taken from description) SQL managed instances should use customer-managed keys to encrypt data at rest (ac01ad65-10e5-46df-bdd9-6b0cad13e1d2) |
|||||||||||||||||||||
Effect | Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
|||||||||||||||||||||
RBAC role(s) | none | |||||||||||||||||||||
Rule aliases | THEN-ExistenceCondition (2)
|
|||||||||||||||||||||
Rule resource types | IF (1) |
|||||||||||||||||||||
Compliance | Not a Compliance control | |||||||||||||||||||||
Initiatives usage | none | |||||||||||||||||||||
History |
|
|||||||||||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
|||||||||||||||||||||
JSON |
|