Microsoft Azure Security Technologies (AZ-500)
Host Security
Deploy disk encryption
Securing your data is essential, and encrypting your disks plays a pivotal role in protecting sensitive information. Azure Disk Encryption (ADE) offers a robust solution to encrypt both operating system and data disks for Windows and Linux virtual machines. In this guide, we explain how ADE works and walk you through its configuration, helping you achieve a balance between security and performance for your applications.
ADE leverages BitLocker for Windows and dm-crypt for Linux to encrypt disks seamlessly. The encryption keys are securely stored in Azure Key Vault, ensuring that only the virtual machine owner has access. This means that if someone downloads a virtual hard disk (VHD) and attaches it to another VM without the necessary keys, the data remains unreadable.
Backup and Performance Considerations
When using Azure Backup, your encryption keys are saved to the Recovery Services vault, and backups are encrypted with AES 256-bit encryption. This ensures that your backups are secure and tamper-proof.
While disk encryption adds an extra layer of security, it might introduce a slight performance overhead due to the continuous encryption and decryption processes. For CPU-intensive applications, you might consider encrypting only the data disk to optimize performance without compromising the security of your mission-critical data.
With Azure Disk Encryption, you have the flexibility to safeguard your data in accordance with your application’s performance requirements.
Managed Disk Encryption Options
Azure offers several disk encryption options to fit various use cases. Below is an overview of these options:
Encryption at Rest with Platform Managed Key (SSE+PMK):
SSE automatically encrypts data before storage and decrypts it during access. With Platform Managed Keys, all key management is handled by Azure. Note that this method does not encrypt temporary disks, caches, or the data flow between compute and storage, and it does not support customer-managed keys (CMK). In Microsoft Defender for Cloud, the disk encryption status might appear as unhealthy.Encryption at Rest with Customer Managed Key (SSE+CMK):
This option provides the same encryption benefits as SSE while allowing you to manage your encryption keys independently. However, if you choose SSE+CMK, you cannot enable Azure Disk Encryption on the VM, and Microsoft Defender for Cloud will flag the machine as unhealthy.Encryption at Host:
This approach encrypts data in use, ensuring protection for temporary disks, OS, and data disks. Similar to SSE, Encryption at Host supports both Platform Managed Keys and Customer Managed Keys. However, when using Encryption at Host, Azure Disk Encryption is not available, and the VM may be marked as unhealthy in Microsoft Defender for Cloud.
In summary, consider the following when selecting an encryption method:
- SSE provides automatic encryption with minimal setup.
- ADE is ideal for those who require granular control over virtual machine disk encryption using BitLocker or dm-crypt.
- Encryption at Host is best suited for environments that require comprehensive encryption of data in use, but it is not compatible with ADE.
Enabling Azure Disk Encryption in the Azure Portal
Follow these step-by-step instructions to enable Azure Disk Encryption on your virtual machine via the Azure portal:
- Open the Azure portal and navigate to Virtual Machines.
- Select the target virtual machine and click on Disk.
- When selecting a disk, you will initially see the SSE (Storage Service Encryption) settings with a platform-managed key. Note that this setting cannot be altered unless the disk is detached from the VM.
- Scroll down to the Additional settings section. Here you will see options for enabling Encryption at Host or Azure Disk Encryption (ADE). Keep in mind that Encryption at Host is available only when the virtual machine is deallocated.
- Choose ADE and configure your encryption keys by linking to Azure Key Vault. Click to create a new Key Vault—for example, name it "ADE AKV." Ensure that the name is unique.
- Within the Key Vault, create your encryption key (e.g., "AAD key") and save your changes. The virtual machine will require a restart to apply the new encryption settings.
Unsupported Scenarios
Before proceeding, note the following unsupported scenarios when using ADE:
- Encrypting basic tier VMs or migrating to classic is not supported.
- Encrypting VMs utilizing software-based RAID systems is not supported.
- ADE cannot be applied to VMs with disks already encrypted using Encryption at Host or SSE+CMK.
- Encryption of Azure Ultra Disks, Premium SSD v2 disks, iSCSI, ephemeral disks, dynamic volumes, NFS, and Azure Files is unsupported.
Once your key is created and saved, Azure Key Vault will update, and ADE will be enabled on your virtual machine.
For bulk deployments, refer to the Microsoft documentation for scripts that enable ADE on multiple VMs.
Up Next: Microsoft Defender for Endpoints
In the next section, we will explore Microsoft Defender for Endpoints to enhance your overall security posture.
By following these guidelines, you can easily secure your data with Azure Disk Encryption while maintaining performance and compliance for your computing environment.
Watch Video
Watch video content