Why use a Key Encryption Key (KEK)?

Iain Shepherd 21 Reputation points
2021-08-22T02:07:14.527+00:00

What attack scenario(s) does it prevent or mitigate?

(Assume that no-one in the org needs access to the key vault)

Azure Disk Encryption
Azure Disk Encryption
An Azure service for virtual machines (VMs) that helps address organizational security and compliance requirements by encrypting the VM boot and data disks with keys and policies that are controlled in Azure Key Vault.
174 questions
0 comments No comments
{count} votes

Accepted answer
  1. Sumarigo-MSFT 46,126 Reputation points Microsoft Employee
    2021-08-23T09:03:25.167+00:00

    @Iain Shepherd Welcome to Microsoft Q&A Forum, Thank you for posting your query here!

    It's a add extra layer of security, lets say if some knows the secret which is plain text then they can easily get the data from the secret and open the encrypted disk, when you use KEY, it wraps the secrets with the key, So that in order to retrieve the secret content you need to decode it using Key

    Additional information: Encryption keys and secrets are safeguarded in your Azure Key Vault subscription. By using the Azure Backup service, you can back up and restore encrypted virtual machines (VMs) that use Key Encryption Key (KEK) configuration.

    When you use client-side encryption with Key Vault, your data is encrypted using a one-time symmetric Content Encryption Key (CEK) that is generated by the Azure Storage client SDK. The CEK is encrypted using a Key Encryption Key (KEK), which can be either a symmetric key or an asymmetric key pair. You can manage it locally or store it in Key Vault. The encrypted data is then uploaded to Azure Storage.

    When Server-side encryption with service-managed keys is used, the key creation, storage, and service access are all managed by the service. Typically, the foundational Azure resource providers will store the Data Encryption Keys in a store that is close to the data and quickly available and accessible while the Key Encryption Keys are stored in a secure internal store.

    Advantages: Simple setup
    Microsoft manages key rotation, backup, and redundancy
    Customer does not have the cost associated with implementation or the risk of a custom key management scheme.

    For more information: Refer to this article

    Hope this helps!
    Kindly let us know if the above helps or you need further assistance on this issue.

    -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.