Skip to main content

Overview


https://learn.microsoft.com/en-us/training/modules/storage-security/

  • Define data sovereignty and how that is achieved in Azure
  • Configure Azure Storage access in a secure and managed way
  • Encrypt your data while it is at rest and in transit
  • Apply rules for data retention

Define Data Sovereignty


Data sovereignty is the idea that the digital data is still bound by the laws of the land in which it exists.

Each region is paired with another region making "paired regions"

Benefits of paired regions:

  • physical isolation - each datacenter is 300 miles from the nearest.
  • platform provided replication
  • region recovery priority - one of the paired regions has a higher priority than the other so that region specific recovery can be restored quicker.
  • Data residency
  • Sequential updates

Configure Azure Storage Access


  • Entra ID authentication - use this whenever possible. MS recommended authentication
  • Shared Key
  • Shared access signatures (SAS)
  • Anonymous and public access to the blobs.

Deploy Shared Access Signatures


  • Service Level
  • Account Level

Architecture usually looks like this:

image.png

And if you don't want to route through the front end proxy:
image.png

Manage Microsoft Entra storage authentication


Storage Blob Reader

Implement Storage service encryption


All data automatically encrypted using SSE Azure Disk Encryption Data in transit encrypted using HTTPS or Client Side Encryption

Azure Storage Encryption is used by default when the data is at rest. It cannot be turned off.

Microsoft Managed Keys - MMKs Customer Managed Keys - CMKs

Blob data retention policies


Immutable storage can be enabled on Azure Blob storage. WORM policies (Write once, read many) can be on all tiers. Users can place data in the respective tier and the data can remain immutable.

  • Time based
  • Legal Hold

Container level configuration Auditing and logging.

Note: Containers can have both a time based AND legal hold policies enabled on them at the same time.

Configure Azure files authentication


SMB shares retain the ACLS from the Windows share.

Identity based authentication - AD DS via Microsoft Entra ID authentication

Enable Secure transfer


You can block any transfer of data to the Azure Files unless it is secure over HTTPS or SMB 3.0 with encryption.