Policy: Azure > CIS v4.0 > 02 - Common Reference Recommendations > 02.01 - Secrets and Keys > 02.01.01 - Encryption Key Management > 02.01.01.02 - Customer Managed Keys (CMK) > 02.01.01.02.01 - Ensure Critical Data is Encrypted with Customer Managed Keys (CMK)
Configures auditing against a CIS Benchmark item.
Level: 2
Customer Managed Keys (CMK) provide additional control over encryption keys, including the ability to rotate, disable, and audit key usage.
By default, data at rest is encrypted using Microsoft managed keys. However, for increased control and regulatory compliance, Customer Managed Keys (CMK) stored in Azure Key Vault can be used.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Setting this policy configures this control:
Policy Specification
Schema Type | |
|---|---|
Default | |
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/cis#/control/categories/v071408
- tmod:@turbot/azure-cisv4-0#/policy/types/r0201010201
- turbot graphql policy-type --id "tmod:@turbot/azure-cisv4-0#/policy/types/r0201010201"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-cisv4-0#/policy/types/r0201010201"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI