Designing storage security – Exploring Storage Solutions

Protecting your data is a crucial consideration with any storage mechanism. Luckily, security is at the heart of Azure components, and storage solutions implement various protection levels by default.

We will take a look at the different security options for Cosmos DB and Azure SQL in Chapter 12, Creating Saleable and Secure Databases. In this section, we will look at how to secure Azure Storage accounts.

Securing your data can be achieved in four different ways:

  • Network protection: First, we need to protect your data against unauthorized access at the network level – only allow access from the applications that need access and no more.
  • Authorization: Next, ensure that any system or person who can access the network level also has to access the data based on their account—in other words, use Role-Based Access Controls (RBAC).
  • Encryption: Ensure data is encrypted so that if a hacker were able to bypass the network and role-based controls, they cannot access the data itself without access to the relevant encryption keys.
  • Auditing and threat detection: If a breach does occur, auditing enables you to track down who, when, and how the data was accessed.

We will start with how to protect storage at the network level.

Network protection

The first step in access prevention is to stop applications or systems from accessing the data if they don’t need to. For example, an application might use a web interface to read and write the data – end users don’t need direct access. In this scenario, we should lock down access to the application itself.

By default, storage accounts allow access from all network devices, so anyone with the URL to a file in the storage account can access it. This is not required in the preceding example; instead, we can configure Azure storage to only allow traffic from a selected IP range or Azure subnet.

The following screenshot shows the Networking blade of a storage account configured to allow access from a set subnet:

Figure 9.6 – Configuring storage network protection

Here, note the Exceptions section – by default, the option to Allow trusted Microsoft services to access this storage account is checked. This is useful because when you lock down a storage account, you might need to provide access to Azure Event Grid, Azure Data Factory, or a range of other Azure services. Although Microsoft does publish the IP ranges for these services, they are subject to change; therefore, checking this box opens the storage account to all of those services. Please refer to the following link for an up-to-date list of what is included: https://docs.microsoft.com/en-gb/azure/storage/common/storage-network-security.

Choosing whether to turn on network-level security requires some thought in terms of how your solution will work.

For example, a website might contain images and videos; however, these might all be stored in a storage account. To serve the media to end users, the web application can either get the files from the storage account and pass them to the user or supply a URL link to the asset directly in the storage account. In this situation, the account must be set to allow all networks, as the client could come from anywhere.

Leave a Reply

Your email address will not be published. Required fields are marked *



          Copyright © 2015-2024 | About | Terms of Service | Privacy Policy