Skip to content

Commit 5e04ee4

Browse files
committed
updates to applies to
1 parent aa5319c commit 5e04ee4

3 files changed

Lines changed: 4 additions & 4 deletions

File tree

azure-sql/database/transparent-data-encryption-tde-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,14 @@ ms.date: 06/15/2020
1616
# Transparent data encryption for SQL Database, SQL Managed Instance, and Azure Synapse Analytics
1717
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
1818

19-
[Transparent data encryption (TDE)](/sql/relational-databases/security/encryption/transparent-data-encryption) helps protect Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics against the threat of malicious offline activity by encrypting data at rest. It performs real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application. By default, TDE is enabled for all newly deployed databases and must be manually enabled for older databases of Azure SQL Database, Azure SQL Managed Instance, or Azure Synapse Analytics.
19+
[Transparent data encryption (TDE)](/sql/relational-databases/security/encryption/transparent-data-encryption) helps protect Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics against the threat of malicious offline activity by encrypting data at rest. It performs real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application. By default, TDE is enabled for all newly deployed SQL Databases and must be manually enabled for older databases of Azure SQL Database, Azure SQL Managed Instance. TDE must be manually enabled for Azure Synapse Analytics.
2020

2121
TDE performs real-time I/O encryption and decryption of the data at the page level. Each page is decrypted when it's read into memory and then encrypted before being written to disk. TDE encrypts the storage of an entire database by using a symmetric key called the Database Encryption Key (DEK). On database startup, the encrypted DEK is decrypted and then used for decryption and re-encryption of the database files in the SQL Server database engine process. DEK is protected by the TDE protector. TDE protector is either a service-managed certificate (service-managed transparent data encryption) or an asymmetric key stored in [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault) (customer-managed transparent data encryption).
2222

2323
For Azure SQL Database and Azure Synapse, the TDE protector is set at the [server](logical-servers.md) level and is inherited by all databases associated with that server. For Azure SQL Managed Instance (BYOK feature in preview), the TDE protector is set at the instance level and it is inherited by all encrypted databases on that instance. The term *server* refers both to server and instance throughout this document, unless stated differently.
2424

2525
> [!IMPORTANT]
26-
> All newly created databases in SQL Database and Azure Synapse are encrypted by default by using service-managed transparent data encryption. Existing SQL databases created before May 2017 and SQL databases created through restore, geo-replication, and database copy are not encrypted by default. Existing SQL Managed Instance databases created before February 2019 are not encrypted by default. SQL Managed Instance databases created through restore inherit encryption status from the source.
26+
> All newly created databases in SQL Database are encrypted by default by using service-managed transparent data encryption. Existing SQL databases created before May 2017 and SQL databases created through restore, geo-replication, and database copy are not encrypted by default. Existing SQL Managed Instance databases created before February 2019 are not encrypted by default. SQL Managed Instance databases created through restore inherit encryption status from the source.
2727
2828
> [!NOTE]
2929
> TDE cannot be used to encrypt the **master** database in SQL Database. The **master** database contains objects that are needed to perform the TDE operations on the user databases.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
<Token>**APPLIES TO:** ![yes](../media/applies-to/yes.png)Azure SQL Database ![yes](../media/applies-to/yes.png)Azure Synapse Analytics (Preview) </Token>
1+
<Token>**APPLIES TO:** ![yes](../media/applies-to/yes.png)Azure SQL Database ![yes](../media/applies-to/yes.png)Azure Synapse Analytics (SQL DW) </Token>
22

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
<Token>**APPLIES TO:** ![yes](../media/applies-to/yes.png)Azure SQL Database ![yes](../media/applies-to/yes.png)Azure SQL Managed Instance ![yes](../media/applies-to/yes.png) Azure Synapse Analytics (Preview) </Token>
1+
<Token>**APPLIES TO:** ![yes](../media/applies-to/yes.png)Azure SQL Database ![yes](../media/applies-to/yes.png)Azure SQL Managed Instance ![yes](../media/applies-to/yes.png) Azure Synapse Analytics (SQL DW) </Token>
22

0 commit comments

Comments
 (0)