Skip to main content

Documentation Index

Fetch the complete documentation index at: https://help.dsalta.com/llms.txt

Use this file to discover all available pages before exploring further.

Checks that Azure Key Vaults are configured to be recoverable (soft delete enabled).

Why This Matters

Encryption keys that are not rotated regularly or lack proper access controls can be compromised, rendering all encrypted data vulnerable. Key rotation policies are required by SOC 2, ISO 27001, and PCI DSS (Requirement 3.6).

What DSALTA Checks

DSALTA connects to your Microsoft Azure environment using read-only API access and evaluates this configuration on every sync cycle. The test result appears in your Data Library → Tests dashboard:
  • Passing — The configuration meets requirements. No action needed.
  • Failing — The configuration does not meet requirements. Follow the remediation steps below.
  • Not configured — The integration is connected but the required service or feature has not been set up yet.
This test runs automatically every 24 hours. If you fix the underlying issue, DSALTA will detect the change on the next sync cycle and update the status to Passing. You can also trigger a manual sync from Settings → Integrations → Microsoft Azure.

How to Fix

If this test is failing, follow these steps to remediate:
  1. Sign in to the Azure Portal and navigate to Key Vaults → your vault.
  2. Go to Properties.
  3. Verify Soft delete is Enabled (this is now default for all new vaults).
  4. Verify Purge protection is Enabled — this prevents permanent deletion during the retention period.
  5. Set the soft delete retention period (7-90 days, default 90).
  6. For existing vaults without soft delete, enable it via Azure CLI: az keyvault update --name VAULT_NAME --enable-soft-delete true --enable-purge-protection true.
  7. Once configured, DSALTA will detect the change on the next sync and update the test status to Passing.

Frequently Asked Questions

This test runs automatically every 24 hours when the Microsoft Azure integration is connected. You can trigger a manual sync at any time from the integration settings page.
A failing test generates an alert in your DSALTA dashboard. The assigned responsible role receives a notification. Remediate the issue before it affects your compliance posture.
Yes. If this test does not apply to your environment, you can mark it as Not Applicable with a justification. This exclusion is documented for auditors.
No. DSALTA uses read-only API access and never modifies, creates, or deletes resources in your environment. Remediation actions must be performed by your team directly in Microsoft Azure.