Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 34fa2e3

Browse files
committedJan 26, 2020
added CMK for RSA
1 parent a4ac6c0 commit 34fa2e3

File tree

4 files changed

+144
-0
lines changed

4 files changed

+144
-0
lines changed
 

‎articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,8 @@
110110
href: connect-azure-stack.md
111111
- name: Multiple tenants (MSSP)
112112
href: multiple-tenants-service-providers.md
113+
- name: Set up customer managed keys (CMK)
114+
href: customer-managed-keys.md
113115
- name: Create incidents from alerts
114116
href: create-incidents-from-alerts.md
115117
- name: Hunting
Lines changed: 142 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,142 @@
1+
---
2+
title: Set up customer managed keys in Azure Sentinel| Microsoft Docs
3+
description: Learn how to set up customer managed keys (CMK) in Azure Sentinel.
4+
services: sentinel
5+
documentationcenter: na
6+
author: rkarlin
7+
manager: rkarlin
8+
editor: ''
9+
10+
ms.service: azure-sentinel
11+
ms.subservice: azure-sentinel
12+
ms.devlang: na
13+
ms.topic: conceptual
14+
ms.tgt_pltfrm: na
15+
ms.workload: na
16+
ms.date: 01/30/2019
17+
ms.author: rkarlin
18+
19+
---
20+
# Set up Azure Sentinel customer-managed key
21+
22+
This article provides background information and steps to configure a customer managed key (CMK) for Azure Sentinel. CMK enables all data saved or sent to
23+
Azure Sentinel to be encrypted in all relevant storage resources with an Azure Key Vault key created or owned by you.
24+
25+
> [!NOTE]
26+
> - The Azure Sentinel CMK capability is provided only to customers who are **new** and access to this capability is controlled by Azure feature registration. You can request access by contacting azuresentinelCMK@microsoft.com, and as capacity is available, pending requests will be approved.
27+
> - The Azure Sentinel CMK capability is only available in East US, West US 2, and South-Central US regions.
28+
> - The CMK capability is only available to customers sending 1TB per day or more. You will receive information about additional pricing when you apply
29+
to Microsoft to provision CMK on your Azure subscription. Learn more about [Log Analytics](../azure-monitor/platform/customer-managed-keys.md#disclaimers) charging.
30+
31+
## How CMK works
32+
33+
The Azure Sentinel solution uses a several storage resources for log collection and features, these include Log Analytics and other storage resources. As part
34+
of the Azure Sentinel CMK configuration, you will have to configure the CMK settings on the related storage resources as well. Data saved in storage
35+
resources other than Log Analytics will also be encrypted.
36+
37+
> [!NOTE]
38+
> If you enable CMK on Azure Sentinel, any Public Preview feature that does not support CMK will not be enabled.
39+
40+
## Enable CMK
41+
42+
To provision CMK, follow these steps: 
43+
44+
1. Create an Azure Key Vault and storing key
45+
46+
2. Enable CMK on your Log Analytics workspace
47+
48+
3. Register for Cosmos DB
49+
50+
4. Add an access policy to your Azure Key Vault instance
51+
52+
5. Enable CMK in Azure Sentinel
53+
54+
6. Enable Azure Sentinel
55+
56+
### STEP 1: Create an Azure Key Vault and storing key
57+
58+
1. [Create Azure Key Vault resource](https://docs.microsoft.com/azure-stack/user/azure-stack-key-vault-manage-portal?view=azs-1910),
59+
then generate or import a key to be used for data encryption.
60+
61+
> [!NOTE]
62+
> Azure Key Vault must be configured as recoverable to protect your key and the access.
63+
64+
1. [Turn on recovery options:](../key-vault/key-vault-best-practices.md#turn-on-recovery-options)
65+
66+
- Make sure [Soft Delete](../key-vault/key-vault-ovw-soft-delete.md) is turned on.
67+
68+
- Turn on [Purge protection](../key-vault/key-vault-ovw-soft-delete.md#purge-protection) to guard against forced deletion of the secret / vault even after soft delete.
69+
70+
### STEP 2: Enable CMK on your Log Analytics workspace
71+
72+
Follow the instructions in [Azure Monitor customer-managed key configuration](../azure-monitor/platform/customer-managed-keys.md) in order to create a CMK workspace that will be used as the Azure Sentinel workspace in the following steps.
73+
74+
### STEP 3: Register for Cosmos DB
75+
76+
Azure Sentinel works with Cosmos DB as an additional storage resource. Make sure to register to Cosmos DB.
77+
78+
Follow the Cosmos DB instruction to [Register the Azure Cosmos DB](../cosmos-db/how-to-setup-cmk.md#register-resource-provider) resource provider for your Azure subscription.
79+
80+
### STEP 4: Add an access policy to your Azure Key Vault instance
81+
82+
Make sure to add access from Cosmos DB to your Azure Key Vault instance. Follow the Cosmos DB instruction to [add an access policy to your Azure Key Vault instance](../cosmos-db/how-to-setup-cmk.md#add-an-access-policy-to-your-azure-key-vault-instance) with Azure Cosmos DB principal.
83+
84+
### STEP 5: Enable CMK in Azure Sentinel
85+
86+
The Azure Sentinel CMK capability is provided to new customers only after receiving access directly from the Azure product group. Use your contacts at Microsoft to receive approval from the Azure Sentinel team to enable CMK in your solution.
87+
88+
After you get approval, you will be asked to provide the following information to enable the CMK feature.
89+
90+
1. Workspace ID on which you want to enable CMK
91+
92+
2. Key Vault URL: Copy the key’s “Key Identifier” up to the last forward slash:
93+
94+
95+
![key identifier](./media/customer-managed-keys/key-identifier.png)
96+
97+
The Azure Sentinel team will enable the Azure Sentinel CMK feature for your
98+
provided workspace.
99+
100+
3. Make sure you receive verification that you were approved before proceeding
101+
to the next step.
102+
103+
### STEP 6: Enable Azure Sentinel
104+
105+
106+
Go to the Azure portal and enable Azure Sentinel on the workspace on which you set up CMK. For more information, see [Azure Sentinel Onboarding](quickstart-onboard.md).
107+
108+
## Key Encryption Key revocation or deletion
109+
110+
111+
In the event that a user revokes the key encryption key, either by deleting it or removing access for Azure Sentinel, within one hour, Azure Sentinel will
112+
honor the change and behave as if the data is no longer available. At this point, any operation performed that uses persistent storage resources such as
113+
data ingestion, persistent configuration changes, and incident creation, will be prevented. Previously stored data will not be deleted but will remain
114+
inaccessible. Inaccessible data is governed by the data-retention policy and will be purged in accordance with that policy.
115+
116+
The only operation possible after the encryption key is revoked or deleted is account deletion.
117+
118+
If access is restored after revocation, Azure Sentinel will restore access to the data within an hour.
119+
120+
To understand more about how this works in Azure Monitor, see [Azure Monitor CMK revocation](../azure-monitor/platform/customer-managed-keys.md#cmk-kek-revocation).
121+
122+
## Key encryption key rotation
123+
124+
125+
Azure Sentinel and Log Analytics support key rotation. When a user performs key rotation in Key Vault, Azure Sentinel supports the new key within an hour.
126+
127+
In Key Vault, you can perform key rotation by creating a new version of the key:
128+
129+
![key rotation](./media/customer-managed-keys/key-rotation.png)
130+
131+
You can disable the previous version of the key after 24 hours, or after the Azure Key Vault audit logs no longer show any activity that uses the previous
132+
version.
133+
134+
If you use the same key in Azure Sentinel and in Log Analytics, it is necessary to perform key rotation you must explicitly update the cluster resource in Log
135+
Analytics with the new Azure Key Vault key version. For more information, see [Azure Monitor CMK rotation](../azure-monitor/platform/customer-managed-keys.md#cmk-kek-rotation).
136+
137+
## Next steps
138+
In this document, you learned how to set up a customer managed key in Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
139+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
140+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
141+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
142+
Loading
Loading

0 commit comments

Comments
 (0)
Please sign in to comment.