静态数据的 Azure 存储加密Azure Storage encryption for data at rest

在将数据保存到云时,Azure 存储会使用服务器端加密 (SSE) 自动对数据进行加密。Azure Storage uses server-side encryption (SSE) to automatically encrypt your data when it is persisted to the cloud. Azure 存储加密可以保护数据,并帮助组织履行在安全性与合规性方面做出的承诺。Azure Storage encryption protects your data and to help you to meet your organizational security and compliance commitments.

关于 Azure 存储加密About Azure Storage encryption

Azure 存储中的数据将使用 256 位 AES 加密法(可用的最强大块加密法之一)以透明方式进行加密和解密,并符合 FIPS 140-2 规范。Data in Azure Storage is encrypted and decrypted transparently using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. Azure 存储加密法类似于 Windows 上的 BitLocker 加密法。Azure Storage encryption is similar to BitLocker encryption on Windows.

已为所有存储帐户(包括资源管理器和经典存储帐户)启用 Azure 存储加密。Azure Storage encryption is enabled for all storage accounts, including both Resource Manager and classic storage accounts. 无法禁用 Azure 存储加密。Azure Storage encryption cannot be disabled. 由于数据默认受到保护,因此无需修改代码或应用程序,即可利用 Azure 存储加密。Because your data is secured by default, you don't need to modify your code or applications to take advantage of Azure Storage encryption.

不管存储帐户的性能层级(标准或高级)、访问层级(热访问层或冷访问层)或部署模型(Azure 资源管理器或经典)如何,都会将存储帐户中的数据加密。Data in a storage account is encrypted regardless of performance tier (standard or premium), access tier (hot or cool), or deployment model (Azure Resource Manager or classic). 存档层级中的所有 blob 也都是加密的。All blobs in the archive tier are also encrypted. 所有 Azure 存储冗余选项都支持加密,当启用了异地复制时,会对主要区域和次要区域中的所有数据进行加密。All Azure Storage redundancy options support encryption, and all data in both the primary and secondary regions is encrypted when geo-replication is enabled. 所有 Azure 存储资源(包括 Blob、磁盘、文件、队列和表)都会加密。All Azure Storage resources are encrypted, including blobs, disks, files, queues, and tables. 所有对象元数据也会加密。All object metadata is also encrypted. Azure 存储加密不会产生额外的费用。There is no additional cost for Azure Storage encryption.

2017 年 10 月 20 日后写入 Azure 存储的每个块 Blob、追加 Blob 或页 Blob 均已加密。Every block blob, append blob, or page blob that was written to Azure Storage after October 20, 2017 is encrypted. 在此日期之前创建的 Blob 继续由后台进程加密。Blobs created prior to this date continue to be encrypted by a background process. 若要强制对 2017 年 10 月 20 日之前创建的 Blob 进行加密,可以重写 Blob。To force the encryption of a blob that was created before October 20, 2017, you can rewrite the blob. 若要了解如何检查 Blob 的加密状态,请参阅 检查 Blob 的加密状态To learn how to check the encryption status of a blob, see Check the encryption status of a blob.

有关 Azure 存储加密的底层加密模块的详细信息,请参见加密 API:下一代For more information about the cryptographic modules underlying Azure Storage encryption, see Cryptography API: Next Generation.

有关 Azure 托管磁盘的加密和密钥管理的信息,请参阅 Azure 托管磁盘的服务器端加密For information about encryption and key management for Azure managed disks, see Server-side encryption of Azure managed disks.

关于加密密钥管理About encryption key management

默认情况下,新存储帐户中的数据使用 Microsoft 管理的密钥进行加密。Data in a new storage account is encrypted with Microsoft-managed keys by default. 你可以继续依赖于使用 Microsoft 管理的密钥来加密数据,也可以使用你自己的密钥来管理加密。You can continue to rely on Microsoft-managed keys for the encryption of your data, or you can manage encryption with your own keys. 如果你选择使用自己的密钥来管理加密,则有两种选择。If you choose to manage encryption with your own keys, you have two options. 可以使用任何一种类型的密钥管理,或者使用这两种类型:You can use either type of key management, or both:

  • 可以指定客户管理的密钥,用于对 Blob 存储和 Azure 文件存储中的数据进行加密和解密。1,2 客户管理的密钥必须存储在 Azure Key Vault 中。You can specify a customer-managed key to use for encrypting and decrypting data in Blob storage and in Azure Files.1,2 Customer-managed keys must be stored in Azure Key Vault. 若要详细了解客户管理的密钥,请参阅使用客户管理的密钥进行 Azure 存储加密For more information about customer-managed keys, see Use customer-managed keys for Azure Storage encryption.
  • 可以在 Blob 存储操作中指定客户提供的密钥。You can specify a customer-provided key on Blob storage operations. 对 Blob 存储发出读取或写入请求的客户端可以在请求中包含加密密钥,以便精细控制 Blob 数据的加密和解密方式。A client making a read or write request against Blob storage can include an encryption key on the request for granular control over how blob data is encrypted and decrypted. 有关客户提供的密钥的详细信息,请参阅在对 Blob 存储的请求中提供加密密钥For more information about customer-provided keys, see Provide an encryption key on a request to Blob storage.

下表比较了 Azure 存储加密的密钥管理选项。The following table compares key management options for Azure Storage encryption.

密钥管理参数Key management parameter Microsoft 管理的密钥Microsoft-managed keys 客户管理的密钥Customer-managed keys 客户提供的密钥Customer-provided keys
加密/解密操作Encryption/decryption operations AzureAzure AzureAzure AzureAzure
支持的 Azure 存储服务Azure Storage services supported 全部All Blob 存储、Azure 文件存储Blob storage, Azure Files Blob 存储Blob storage
密钥存储Key storage Microsoft 密钥存储Microsoft key store Azure Key VaultAzure Key Vault 客户自己的密钥存储Customer's own key store
密钥轮换责任Key rotation responsibility MicrosoftMicrosoft 客户Customer 客户Customer
密钥控制Key control MicrosoftMicrosoft 客户Customer 客户Customer

备注

Microsoft 管理的密钥会根据合规性要求进行适当的轮换。Microsoft-managed keys are rotated appropriately per compliance requirements. 如果有特定密钥轮换要求,Microsoft 建议你改为使用客户管理的密钥,以便自行管理和审核轮换。If you have specific key rotation requirements, Microsoft recommends that you move to customer-managed keys so that you can manage and audit the rotation yourself.

后续步骤Next steps