Manage your customer-managed encryption key

Customers have data privacy and compliance requirements to secure their data by encrypting their data at-rest. This secures the data from exposure in an event where a copy of the database is stolen. With data encryption at-rest, the stolen database data is protected from being restored to a different server without the encryption key.

All customer data stored in Power Platform is encrypted at-rest with strong Microsoft-managed encryption keys by default. Microsoft stores and manages the database encryption key for all your data so you don't have to. However, Power Platform provides this customer-managed encryption key (CMK) for your added data protection control where you can self-manage the database encryption key that is associated with your Microsoft Dataverse environment. This allows you to rotate or swap the encryption key on demand, and also allows you to prevent Microsoft's access to your customer data when you revoke the key access to our services at any time.

To learn more about customer managed key in Power Platform, watch the customer-managed key video.

These encryption key operations are available with customer-managed key (CMK):

  • Create an RSA (RSA-HSM) key from your Azure Key vault.
  • Create a Power Platform enterprise policy for your key.
  • Grant the Power Platform enterprise policy permission to access your key vault.
  • Grant the Power Platform service admin to read the enterprise policy.
  • Apply encryption key to your environment.
  • Revert/remove environment’s CMK encryption to Microsoft-managed key.
  • Change key by creating a new enterprise policy, removing the environment from CMK and reapply CMK with new enterprise policy.
  • Lock CMK environments by revoking CMK key vault and/or key permissions.
  • Migrate bring-your-own-key (BYOK) environments to CMK by applying CMK key.

Currently, all your customer data stored only in the following apps and services can be encrypted with customer-managed key:

  • Dataverse (Custom solutions and Microsoft services)
  • Dataverse Copilot for model-driven apps
  • Power Automate
  • Chat for Dynamics 365
  • Dynamics 365 Sales
  • Dynamics 365 Customer Service
  • Dynamics 365 Customer Insights - Data
  • Dynamics 365 Field Service
  • Dynamics 365 Retail
  • Dynamics 365 Finance (Finance and operations)
  • Dynamics 365 Intelligent Order Management (Finance and operations)
  • Dynamics 365 Project Operations (Finance and operations)
  • Dynamics 365 Supply Chain Management (Finance and operations)
  • Dynamics 365 Fraud Protection (Finance and operations)

Note

Nuance Conversational IVR and Maker Welcome Content are excluded from customer-managed key encryption.

Microsoft Copilot Studio stores its data in their own storage and in Microsoft Dataverse. When you apply the customer-managed key to these environments, only the data stores in Microsoft Dataverse are encrypted with your key. The non-Microsoft Dataverse data continues to be encrypted with the Microsoft-managed key.

Note

The connection settings for connectors will continue to be encrypted with a Microsoft-managed key.

Contact a representative for services not listed above for information about customer-managed key support.

Note

Power Apps display names, descriptions, and connection metadata continues to be encrypted with a Microsoft-managed key.

Note

The download results link and other data produced by solution checker enforcement during a solution check continues to be encrypted with a Microsoft-managed key.

Environments with finance and operations apps where Power Platform integration is enabled can also be encrypted. Finance and operations environments without Power Platform integration will continue to use the default Microsoft managed key to encrypt data. More information: Encryption in finance and operations apps

Customer-managed encryption key in the Power Platform

Introduction to customer-managed key

With customer-managed key, administrators can provide their own encryption key from their own Azure Key Vault to the Power Platform storage services to encrypt their customer data. Microsoft doesn't have direct access to your Azure Key Vault. For Power Platform services to access the encryption key from your Azure Key Vault, the administrator creates a Power Platform enterprise policy, which references the encryption key and grants this enterprise policy access to read the key from your Azure Key Vault.

The Power Platform service administrator can then add Dataverse environments to the enterprise policy to start encrypting all the customer data in the environment with your encryption key. Administrators can change the environment's encryption key by creating another enterprise policy and add the environment (after removing it) to the new enterprise policy. If the environment no longer needs to be encrypted using your customer-managed key, the administrator can remove the Dataverse environment from the enterprise policy to revert the data encryption back to Microsoft-managed key.

The administrator can lock the customer-managed key environments by revoking key access from the enterprise policy and unlock the environments by restoring the key access. More information: Lock environments by revoking key vault and/or key permission access

To simplify the key management tasks, the tasks are broken down into three main areas:

  1. Create encryption key.
  2. Create enterprise policy and grant access.
  3. Manage environment's encryption.

Warning

When environments are locked, they can't be accessed by anyone, including Microsoft support. Environments that are locked become disabled and data loss can occur.

Licensing requirements for customer managed key

Customer managed key policy is only enforced on environments that are activated for Managed Environments. Managed Environments are included as an entitlement in standalone Power Apps, Power Automate, Microsoft Copilot Studio, Power Pages, and Dynamics 365 licenses that give premium usage rights. Learn more about Managed Environment licensing, with the Licensing overview for Microsoft Power Platform.

In addition, access to using customer managed key for Microsoft Power Platform and Dynamics 365 requires users in the environments where the encryption key policy is enforced to have one of these subscriptions:

  • Microsoft 365 or Office 365 A5/E5/G5
  • Microsoft 365 A5/E5/F5/G5 Compliance
  • Microsoft 365 F5 Security & Compliance
  • Microsoft 365 A5/E5/F5/G5 Information Protection and Governance
  • Microsoft 365 A5/E5/F5/G5 Insider Risk Management

Learn more about these licenses.

Understand the potential risk when you manage your key

As with any business critical application, personnel within your organization who have administrative-level access must be trusted. Before you use the key management feature, you should understand the risk when you manage your database encryption keys. It's conceivable that a malicious administrator (a person who is granted or has gained administrator-level access with intent to harm an organization's security or business processes) working within your organization might use the manage keys feature to create a key and use it to lock your environments in the tenant.

Consider the following sequence of events.

The malicious key vault administrator creates a key and an enterprise policy on the Azure portal. The Azure Key Vault administrator goes to Power Platform admin center, and adds environments to the enterprise policy. The malicious administrator then returns to the Azure portal and revokes key access to the enterprise policy thus locking all the environments. This causes business interruptions as all the environments become inaccessible, and if this event isn't resolved, that is, the key access restored, the environment data can be potentially lost.

Note

  • Azure Key Vault has built-in safeguards that assist in restoring the key, which require the Soft Delete and Purge protection key vault settings enabled.
  • Another safeguard to be considered is to make sure that there is separation of tasks where the Azure Key Vault administrator isn't granted access to the Power Platform admin center.

Separation of duty to mitigate the risk

This section describes the customer-managed key feature duties that each admin role is responsible for. Separating these tasks helps mitigate the risk involved with customer-managed keys.

Azure Key Vault and Power Platform/Dynamics 365 service admin tasks

To enable customer-managed keys, first the key vault administrator creates a key in the Azure key vault and creates a Power Platform enterprise policy. When the enterprise policy is created, a special Microsoft Entra ID managed identity is created. Next, the key vault administrator returns to the Azure key vault and grants the enterprise policy/managed identity access to the encryption key.

The key vault administrator then grants the respective Power Platform/Dynamics 365 service admin read access to the enterprise policy. Once read permission is granted, the Power Platform/Dynamics 365 service admin can go to the Power Platform Admin Center and add environments to the enterprise policy. All added environments customer data is then encrypted with the customer-managed key linked to this enterprise policy.

Prerequisites
  • An Azure subscription that includes Azure Key Vault or Azure Key Vault managed hardware security modules.
  • A Microsoft Entra ID with:
    • Contributor permission to the Microsoft Entra subscription.
    • Permission to create an Azure Key Vault and key.
    • Access to create a resource group. This is required to set up the key vault.
Create the key and grant access using Azure Key Vault

The Azure Key Vault administrator performs these tasks in Azure.

  1. Create an Azure paid subscription and Key Vault. Ignore this step if you already have a subscription that includes Azure Key Vault.
  2. Go to the Azure Key Vault service, and create a key. More information: Create a key in the key vault
  3. Enable the Power Platform enterprise policies service for your Azure subscription. Do this only once. More information: Enable the Power Platform enterprise policies service for your Azure subscription
  4. Create a Power Platform enterprise policy. More information: Create enterprise policy
  5. Grant enterprise policy permissions to access the key vault. More information: Grant enterprise policy permissions to access key vault
  6. Grant Power Platform and Dynamics 365 administrators permission to read the enterprise policy. More information: Grant the Power Platform admin privilege to read enterprise policy

Power Platform/Dynamics 365 service admin Power Platform admin center tasks

Prerequisite
  • Power Platform administrator must be assigned to either the Power Platform or Dynamics 365 Service administrator Microsoft Entra role.
Manage environment's encryption in Power Platform admin center

The Power Platform administrator manages customer-managed key tasks related to the environment in Power Platform admin center.

  1. Add the Power Platform environments to the enterprise policy to encrypt data with the customer-managed key. More information: Add an environment to the enterprise policy to encrypt data
  2. Remove environments from enterprise policy to return encryption to Microsoft managed key. More information: Remove environments from policy to return to Microsoft managed key
  3. Change the key by removing environments from the old enterprise policy and adding environments to a new enterprise policy. More information: Create encryption key and grant access
  4. Migrate from BYOK. If you're using the earlier self-managed encryption key feature, you can migrate your key to customer managed key. More information: Migrate bring-your-own-key environments to customer-managed key

Create encryption key and grant access

Create an Azure paid subscription and key vault

In Azure, perform the following steps:

  1. Create a Pay-as-you-go or its equivalent Azure subscription. This step isn't needed if the tenant already has a subscription.

  2. Create a resource group. More information: Create resource groups

    Note

    Create or use a resource group that has a location, for example, Central US, that matches the Power Platform environment's region, such as United States.

  3. Create a key vault using the paid subscription that includes soft-delete and purge protection with the resource group you created in the previous step.

    Important

    • To ensure that your environment is protected from accidental deletion of the encryption key, the key vault must have soft-delete and purge protection enabled. You won’t be able to encrypt your environment with your own key without enabling these settings. More information: Azure Key Vault soft-delete overview More information: Create a key vault using Azure portal

Create a key in the key vault

  1. Make sure you've met the prerequisites.
  2. Go to the Azure portal > Key Vault and locate the key vault where you want to generate an encryption key.
  3. Verify the Azure key vault settings:
    1. Select Properties under Settings.
    2. Under Soft-delete, set or verify that it's set to Soft delete has been enabled on this key vault option.
    3. Under Purge protection, set or verify that Enable purge protection (enforce a mandatory retention period for deleted vaults and vault objects) is enabled.
    4. If you made changes, select Save.
Create RSA keys
  1. Create or import a key that has these properties:

    1. On the Key Vault properties pages, select Keys.
    2. Select Generate/Import.
    3. On the Create a key screen set the following values, and then select Create.
      • Options: Generate
      • Name: Provide a name for the key
      • Key type: RSA
      • RSA key size: 2048

    Important

    If you set an expiration date in your key and the key expired, all the environments that're encrypted with this key will be down. Set an alert to monitor expiry certificates with email notifications for your local Power Platform admin and Azure key vault admin as a reminder to renew the expiration date. This is important to prevent any unplanned system outages.

Import protected keys for Hardware Security Modules (HSM)

You can use your protected keys for hardware security modules (HSM) to encrypt your Power Platform Dataverse environments. Your HSM-protected keys must be imported into the key vault so an Enterprise policy can be created. For more information, see Supported HSMs Import HSM-protected keys to Key Vault (BYOK).

Create a key in the Azure Key Vault Managed HSM

You can use an encryption key created from the Azure Key Vault Managed HSM to encrypt your environment data. This gives you FIPS 140-2 Level 3 support.

Create RSA-HSM keys
  1. Make sure you've met the prerequisites.

  2. Go to the Azure portal.

  3. Create a Managed HSM:

    1. Provision the Managed HSM.
    2. Activate the Managed HSM.
  4. Enable Purge Protection in your Managed HSM.

  5. Grant the Managed HSM Crypto User role to the person who created the Managed HSM key vault.

    1. Access the Managed HSM key vault on the Azure portal.
    2. Navigate to Local RBAC and select + Add.
    3. In the Role drop-down list, select the Managed HSM Crypto User role on the Role assignment page.
    4. Select All keys under Scope.
    5. Select Select security principal, and then select the admin on the Add Principal page.
    6. Select Create.
  6. Create an RSA-HSM key:

    • Options: Generate
    • Name: Provide a name for the key
    • Key type: RSA-HSM
    • RSA key size: 2048

    Note

    Supported RSA-HSM key sizes: 2048-bit and 3072-bit.

You can update your Azure Key vault's networking by enabling a private endpoint and use the key in the key vault to encrypt your Power Platform environments.

You can either create a new key vault and establish a private link connection or establish a private link connection to an existing key vault, and create a key from this key vault and use it to encrypt your environment. You can also establish a private link connection to an existing key vault after you have already created a key and use it to encrypt your environment.

  1. Create an Azure Key vault with these options:

    • Enable Purge Protection
    • Key type: RSA
    • Key size: 2048
  2. Copy the key vault URL and the encryption key URL to be used for creating the enterprise policy.

    Note

    Once you've added a private endpoint to your key vault or disabled the public access network, you won’t be able to see the key unless you have the appropriate permission.

  3. Create a virtual network.

  4. Return to your key vault and add private endpoint connections to your Azure Key vault.

    Note

    You need to select the Disable public access networking option and enable the Allow trusted Microsoft services to bypass this firewall exception.

  5. Create a Power Platform enterprise policy. More information: Create enterprise policy

  6. Grant enterprise policy permissions to access the key vault. More information: Grant enterprise policy permissions to access key vault

  7. Grant Power Platform and Dynamics 365 administrators permission to read the enterprise policy. More information: Grant the Power Platform admin privilege to read enterprise policy

  8. Power Platform admin center admin selects the environment to encrypt and enable Managed environment. More information: Enable Managed environment to be added to the enterprise policy

  9. Power Platform admin center admin adds the Managed environment to the enterprise policy. More information: Add an environment to the enterprise policy to encrypt data

Enable the Power Platform enterprise policies service for your Azure subscription

Register Power Platform as a resource provider. You only need to do this task once for each Azure subscription where your Azure Key vault resides. You need to have access rights to the subscription in order to register the resource provider.

  1. Sign in to the Azure portal and go to Subscription > Resource providers.
  2. In the list of Resource providers, search for Microsoft.PowerPlatform, and Register it.

Create enterprise policy

  1. Install PowerShell MSI. More information: Install PowerShell on Windows, Linux, and macOS
  2. After the PowerShell MSI is installed, go back to Deploy a custom template in Azure.
  3. Select the Build your own template in the editor link.
  4. Copy this JSON template into a text editor such as Notepad. More information: Enterprise policy json template
  5. Replace the values in the JSON template for: EnterprisePolicyName, location where EnterprisePolicy needs to be created, keyVaultId, and keyName. More information: Field definitions for json template
  6. Copy the updated template from your text editor then paste it into the Edit template of the Custom deployment in Azure, and select Save.
  7. Select a Subscription and Resource group where the enterprise policy is to be created.
  8. Select Review + create, and then select Create.

A deployment is started. When it's done, the enterprise policy is created.

Enterprise policy json template

 {
    "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
    "contentVersion": "1.0.0.0",
    "parameters": {},
    "resources": [
        {
            "type": "Microsoft.PowerPlatform/enterprisePolicies",
            "apiVersion": "2020-10-30",
            "name": {EnterprisePolicyName},
            "location": {location where EnterprisePolicy needs to be created},
            "kind": "Encryption",
            "identity": {
                "type": "SystemAssigned"
            },
            "properties": {
                "lockbox": null,
                "encryption": {
                    "state": "Enabled",
                    "keyVault": {
                        "id": {keyVaultId},
                        "key": {
                            "name": {keyName}
                        }
                    }
                },
                "networkInjection": null
            }
        }
    ]
   }

Field definitions for JSON template

  • name. Name of the enterprise policy. This is the name of the policy that appears in Power Platform admin center.

  • location. One of the following. This is the location of the enterprise policy and it must correspond with the Dataverse environment’s region:

    • '"unitedstates"'
    • '"southafrica"'
    • '"uk"'
    • '"japan"'
    • '"india"'
    • '"france"'
    • '"europe"'
    • '"germany"'
    • '"switzerland"'
    • '"canada"'
    • '"brazil"'
    • '"australia"'
    • '"asia"'
    • '"uae"'
    • '"korea"'
    • '"norway"'
    • '"singapore"'
    • '"sweden"'
  • Copy these values from your key vault properties in the Azure portal:

    • keyVaultId: Go to Key vaults > select your key vault > Overview. Next to Essentials select JSON View. Copy the Resource ID to the clipboard and paste the entire contents into your JSON template.
    • keyName: Go to Key vaults > select your key vault > Keys. Notice the key Name and type the name into your JSON template.

Grant enterprise policy permissions to access key vault

Once the enterprise policy is created, the key vault administrator grants the enterprise policy’s managed identity access to the encryption key.

  1. Sign into the Azure portal and go to Key vaults.
  2. Select the key vault where the key was assigned to the enterprise policy.
  3. Select the Access control (IAM) tab, and then select + Add.
  4. Select Add role assignment from the drop-down list,
  5. Search Key Vault Crypto Service Encryption User and select it.
  6. Select Next.
  7. Select + Select members.
  8. Search for the enterprise policy you have created.
  9. Select the enterprise policy, and then choose Select.
  10. Select Review + assign.

Note

The above permission setting is based on your key vault's Permission model of Azure role-based access control. If your key vault is set to Vault access policy, it's recommended that you migrate to the role-based model. To grant your enterprise policy access to the key vault using Vault access policy, create an Access policy, select Get on Key management operations and Unwrap key and Wrap key on Cryptographic Operations.

Note

To prevent any unplanned system outages, it's important that the enterprise policy has access to the key. Make sure that:

  • The key vault is active.
  • The key is active and not expired.
  • The key isn't deleted.
  • The above key permissions aren't revoked.

The environments which are using this key will be disabled when the encryption key is not accessible.

Grant the Power Platform admin privilege to read enterprise policy

Administrators who have Dynamics 365 or Power Platform administration roles can access the Power Platform admin center to assign environments to the enterprise policy. To access the enterprise policies, the admin with Azure key vault access is required to grant the Reader role to the Power Platform admin. Once the Reader role is granted, the Power Platform administrator is able to view the enterprise policies on the Power Platform admin center.

Note

Only Power Platform and Dynamics 365 administrators who are granted the reader role to the enterprise policy can add an environment to the policy. Other Power Platform or Dynamics 365 administrators might be able to view the enterprise policy but they'll get an error when they try to Add environment to the policy.

Grant reader role to a Power Platform administrator

  1. Sign into the Azure portal.
  2. Copy the Power Platform or Dynamics 365 admin’s object ID. To do this:
    1. Go to the Users area in Azure.
    2. In the All users list, find the user with Power Platform or Dynamics 365 admin permissions using Search users.
    3. Open the user record, on the Overview tab copy the user’s Object ID. Paste this into a text editor such as NotePad for later.
  3. Copy the enterprise policy resource ID. To do this:
    1. Go to Resource Graph Explorer in Azure.
    2. Enter microsoft.powerplatform/enterprisepolicies in the Search box, and then select the microsoft.powerplatform/enterprisepolicies resource.
    3. Select Run query on the command bar. A list of all the Power Platform enterprise policies is displayed.
    4. Locate the enterprise policy where you want to grant access.
    5. Scroll to the right of the enterprise policy and select See details.
    6. On the Details page, copy the id.
  4. Start Azure Cloud Shell, and run the following command replacing objId with the user’s object ID and EP Resource Id with the enterprisepolicies ID copied in the previous steps: New-AzRoleAssignment -ObjectId { objId} -RoleDefinitionName Reader -Scope {EP Resource Id}

Manage environment's encryption

To manage the environment's encryption, you need the following permission:

  • Microsoft Entra active user who has a Power Platform and/or Dynamics 365 admin security role.
  • Microsoft Entra user who has either a Power Platform or Dynamics 365 service admin role.

The key vault admin notifies the Power Platform admin that an encryption key and an enterprise policy were created and provides the enterprise policy to the Power Platform admin. To enable the customer-managed key, the Power Platform admin assigns their environments to the enterprise policy. Once the environment is assigned and saved, Dataverse initiates the encryption process to set all the environment data, and encrypt it with the customer-managed key.

Enable Managed environment to be added to the enterprise policy

  1. Sign into the Power Platform admin center, and locate the environment.
  2. Select and check the environment on the environments list.
  3. Select the Enable Managed Environments icon on the action bar.
  4. Select Enable.

Add an environment to the enterprise policy to encrypt data

Important

The environment will be disabled when it is added to the enterprise policy for data encryption.

  1. Sign into the Power Platform admin center, and go to Policies > Enterprise policies.
  2. Select a policy, and then on the command bar select Edit.
  3. Select Add environments, select the environment you want, and then select Continue. Add environment to enterprise policy on Power Platform admin center
  4. Select Save, and then select Confirm.

Important

  • Only environments that are in the same region as the enterprise policy are displayed in the Add environments list.
  • The encryption can take up to four days to complete, but the environment might be enabled before the Add environments operation completes.
  • The operation might not complete and if it fails, your data continues to be encrypted with Microsoft managed key. You can re-run the Add environments operation again.

Note

You can only add environments that are enabled as Managed Environments. Trial and Teams environment types can't be added to the enterprise policy.

Remove environments from policy to return to Microsoft managed key

Follow these steps if you want to return to a Microsoft managed encryption key.

Important

The environment will be disabled when it is removed from the enterprise policy to return data encryption using the Microsoft managed key.

  1. Sign into the Power Platform admin center, and go to Policies > Enterprise policies.
  2. Select the Environment with policies tab, and then find the environment you want to remove from customer-managed key.
  3. Select the All policies tab, select the environment you verified in step 2, and then select Edit policy on the command bar. Remove an environment from customer-managed key
  4. Select Remove environment on the command bar, select the environment you want to remove, and then select Continue.
  5. Select Save.

Important

The environment will be disabled when it is removed from the enterprise policy to revert the data encryption to the Microsoft-managed key. Do not delete or disable the key, delete or disable the key vault, or remove the enterprise policy's permissions to the key vault. The key and key vault's access is necessary to support database restoration. You may delete and remove the enterprise policy's permissions after 30 days.

Review the environment's encryption status

Review the encryption status from Enterprise policies

  1. Sign in to the Power Platform admin center.

  2. Select Policies > Enterprise policies.

  3. Select a policy, and then on the command bar select Edit.

  4. Review the environment's Encryption status in the Environments with this policy section.

    Note

    The environment's encryption status can be:

    • Encrypted - the Enterprise policy encryption key is active and the environment is encrypted with your key.
    • Failed - the Enterprise policy encryption key is not used by all Dataverse storage services. They require more time to process and you can re-run the Add environment operation. Contact Support if the re-run fails.
    • Warning - the Enterprise policy encryption key is active and one of the service's data continues to be encrypted with the Microsoft-managed key. Learn more: Power Automate CMK application warning messages

    You can re-run the Add environment option for the environment that has a Failed encryption status.

Review the encryption status from the Environment History page

You can see the environment history.

  1. Sign in to the Power Platform admin center.

  2. Select Environments in the navigation pane, and then select an environment from the list.

  3. On the command bar, select History.

  4. Locate the history for Update Customer Managed Key.

    Note

    The Status shows Running when the encryption is in progress. It shows Succeeded when the encryption is complete. The status shows Failed when there is some problem with one of the services not able to apply the encryption key.

    A Failed state can be a warning and you don't need to re-run the Add environment option. You can confirm if it is a warning.

Change the environment's encryption key with a new enterprise policy and key

To change your encryption key, create a new key and a new enterprise policy. You can then change the enterprise policy by removing the environments and then adding the environments to the new enterprise policy. The system is down two times when changing to a new enterprise policy - 1) to revert the encryption to Microsoft Managed key and 2) to apply the new enterprise policy.

Tip

To rotate the encryption key, we recommend using the Key vaults' New version or setting a Rotation policy.

  1. In Azure portal, create a new key and a new enterprise policy. More information: Create encryption key and grant access and Create an enterprise policy
  2. Once the new key and enterprise policy are created, go to Policies > Enterprise policies.
  3. Select the Environment with policies tab, and then find the environment you want to remove from customer-managed key.
  4. Select the All policies tab, select the environment you verified in step 2, and then select Edit policy on the command bar. Remove an environment from customer-managed key
  5. Select Remove environment on the command bar, select the environment you want to remove, and then select Continue.
  6. Select Save.
  7. Repeat steps 2-6 until all environments in the enterprise policy have been removed.

Important

The environment will be disabled when it is removed from the enterprise policy to revert the data encryption to the Microsoft-managed key. Do not delete or disable the key, delete or disable the key vault, or remove the enterprise policy's permissions to the key vault. The key and key vault's access is necessary to support database restoration. You may delete and remove the enterprise policy's permissions after 30 days.

  1. Once all the environments are removed, from the Power Platform admin center go to Enterprise policies.
  2. Select the new enterprise policy, and then select Edit policy.
  3. Select Add environment, select the environments that you want to add, and then select Continue.

Important

The environment will be disabled when it's added to the new enterprise policy.

Rotate the environment's encryption key with a new key version

You can change the environment’s encryption key by creating a new key version. When you create a new key version, the new key version is automatically enabled. All the storage resources detect the new key version and start applying it to encrypt your data.

When you modify the key or the key version, the protection of the root encryption key changes, but the data in the storage always remains encrypted with your key. There's no more action required on your part to ensure that your data is protected. Rotating the key version doesn't impact performance. There's no downtime associated with rotating the key version. It can take 24 hours for all the resource providers to apply the new key version in the background. The previous key version must not be disabled as it's required for the service to use it for the re-encryption and for the support of database restoration.

To rotate the encryption key by creating a new key version, use the following steps.

  1. Go to the Azure portal > Key Vaults and locate the key vault where you want to create a new key version.
  2. Navigate to Keys.
  3. Select the current, enabled key.
  4. Select + New Version.
  5. The Enabled setting defaults to Yes, which means that the new key version is automatically enabled upon creation.
  6. Select Create.

Tip

To comply with your key rotation policy, you can rotate the encryption key using the Rotation policy. You can either configure a rotation policy or rotate, on demand, by invoking Rotate now.

Important

The new key version is automatically rotated in the background and there is no action required by the Power Platform admin. It is important that the previous key version must not be disabled or deleted for, at least, 28 days to support database restoration. Disabling or deleting the previous key version too early can take your environment offline.

View the list of encrypted environments

  1. Sign into the Power Platform admin center, and go to Policies > Enterprise policies.
  2. On the Enterprise policies page, select the Environments with policies tab. The list of environments that were added to enterprise policies are displayed.

Note

There might be situations where the Environment status or the Encryption status show a Failed status. When this occurs, you can try re-running the Add environment operation or submit a Microsoft Support request for help.

Environment database operations

A customer tenant can have environments that are encrypted using the Microsoft managed key and environments that are encrypted with the customer managed key. To maintain data integrity and data protection, the following controls are available when managing environment database operations.

  • Restore The environment to overwrite (the restored to environment) is restricted to the same environment that the backup was taken from or to another environment that is encrypted with the same customer managed key.

    Restore backup.

  • Copy The environment to overwrite (the copied to environment) is restricted to another environment that is encrypted with the same customer managed key.

    Copy environment.

    Note

    If a Support Investigation environment was created to resolve support issue in a customer managed environment, the encryption key for the Support Investigation environment must be changed to customer managed key before the Copy environment operation can be performed.

  • Reset The environment's encrypted data is deleted including backups. After the environment is reset, the environment encryption will revert back to the Microsoft managed key.

Next steps

About Azure Key Vault