<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Customer Managed Keys on Azure Citadel</title>
    <link>https://www.azurecitadel.com/cmk/</link>
    <description>Recent content in Customer Managed Keys on Azure Citadel</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <atom:link href="https://www.azurecitadel.com/cmk/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Sovereignty scenarios</title>
      <link>https://www.azurecitadel.com/cmk/sovereignty/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.azurecitadel.com/cmk/sovereignty/</guid>
      <description>Applying sovereignty requirements to workloads Digital Sovereignty considerations are usually split into data sovereignty, operational sovereignty and AI sovereignty.&#xA;From an architectural perspective this is largely a workload conversation and reinforces the idea that seeing a customer&amp;rsquo;s estate through an additional sovereignty lens introduces another set of concerns, risks, controls, and compliancy requirements that we need to consider in our decision making and recommendations.&#xA;Some requirements will apply to the whole environment, and some will be applicable to specific workloads.</description>
    </item>
    <item>
      <title>Key management options</title>
      <link>https://www.azurecitadel.com/cmk/keyvaults/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.azurecitadel.com/cmk/keyvaults/</guid>
      <description>Introduction Azure gives you many key management options. Here we will cover three of them: Azure Key Vault Standard and Premium, plus Azure Ket Vault Managed HSM. They share a common API surface but differ significantly in how keys are protected and who ultimately controls them. Choosing the right one has direct implications for your compliance and sovereignty posture.&#xA;Quick guidance&#xA;Azure Key Vault Standard — good for dev/test and low-sensitivity workloads: secrets, certs, software-protected keys.</description>
    </item>
    <item>
      <title>🧪 Azure Key Vault Premium</title>
      <link>https://www.azurecitadel.com/cmk/lab-akvp/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.azurecitadel.com/cmk/lab-akvp/</guid>
      <description>Objectives By the end of this lab you will have:&#xA;Determined a sensible Azure region for these labs. Created a resource group. Created an Azure Key Vault Premium and assigned yourself the Key Vault Crypto Officer role. There is also some additional information on this page about securing vaults and some of the key differences in creating, activating and managing a Managed HSM instead.&#xA;Access The labs assume you are either Owner or have Contributor plus Role Based Access Control Administrator on an Azure subscription as they create resources and RBAC role assignments.</description>
    </item>
    <item>
      <title>L2: Encryption at rest with CMK</title>
      <link>https://www.azurecitadel.com/cmk/at-rest/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.azurecitadel.com/cmk/at-rest/</guid>
      <description>Introduction This page covers encryption at rest — protecting stored data so that it cannot be read without access to your key. Each Azure service that supports customer-managed keys wraps its own internal data encryption keys using your CMK in Key Vault. If your key is unavailable, the service cannot decrypt the data.&#xA;Encryption in use — protecting data while it is being processed, using Azure Confidential Compute — is a separate topic covered later in this series.</description>
    </item>
    <item>
      <title>🧪 CMK for Storage</title>
      <link>https://www.azurecitadel.com/cmk/lab-storage/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.azurecitadel.com/cmk/lab-storage/</guid>
      <description>Objectives By the end of this lab you will have:&#xA;Created an RSA-HSM key in the Azure Key Vault Premium. Created a storage account encrypted with that customer-managed key. Verified that the encryption is in place and points at your key. You will need to have completed the Azure Key Vault Premium lab.&#xA;Set up variables If you are continuing straight from the previous lab then you should already have these set.</description>
    </item>
    <item>
      <title>🧪 CMK for VM Disks and AKS</title>
      <link>https://www.azurecitadel.com/cmk/lab-disks/</link>
      <pubDate>Fri, 06 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.azurecitadel.com/cmk/lab-disks/</guid>
      <description>Objectives By the end of this lab you will have:&#xA;Created a Disk Encryption Set (DES) tied to an HSM-backed key in Azure Key Vault Premium. Deployed a small test network Deployed a VM with its OS disk encrypted via the DES. Created an AKS cluster with node OS disk encryption using the same DES. We will reuse the Azure Key Vault Premium created in the first lab.&#xA;Note that in a real world scenario you would probably use different keys for the virtual machines and the AKS nodes as per the guidance on the Encrypting data at rest with CMK page.</description>
    </item>
  </channel>
</rss>
