All storage accounts in Azure are encrypted by Storage Service Encryption (SSE) using a 256-bit Advanced Encryption Standard (AES) cipher. This makes Azure storage FIPS 140-2 compliant.

Important note

FIPS 140-2 is a US government security standard for the approval of cryptographic processes.

By default, the keys used to encrypt the storage are managed by Microsoft; however, there is also the option to use customer-managed keys instead. These keys can be provided by you or generated by Azure and stored in an Azure key vault. Some organizations demand that all data should be encrypted using individually managed keys.

Access to storage accounts also uses transport-level security in HTTPS to secure communications to the account. HTTPS connections are enforced by default; however, this can be disabled to allow HTTP if required.

Auditing

Auditing is another requirement for some organizations, especially for highly sensitive data. Breaches can happen. And even with well-defined security in place, a breach could occur from insider threats (for example, authorized users).

The Azure event logger logs control-plane events (for example when a storage account is created or deleted). Transactional logs can be activated and sent to an Azure Log Analytics account.

Azure Defender for Storage is another optional advanced threat protection service that can detect and alert unusual activity. Integrated into Azure Security Center, alerts can be sent via email to administrators with details of the event and advice on investigating and remediating.

Through a combination of network, authorization, and encryption, you can ensure your data is safe and secure. In the final section of this chapter, we will investigate the different tools available for managing the data in storage accounts.

Using storage management tools

You will need to copy data into and out of a storage account; therefore, we will examine the different tools available in this final section.

All data operations can be actioned by calling the Azure Storage REST APIs – in fact, all of the other tools that we will explore through this section use the REST APIs themselves.

Azure Storage REST APIs

Each storage service – Blob Storage, Data Lake, Files, Queues, and Tables – all have their endpoint URLs, as follows:

Each service, then, has its own unique set of calls that can be made depending on the action you are trying to take. For example, to get a list of all blobs within a folder, you can follow the GET call:

https://mystor.blob.core.windows.net/?comp=list&maxresults=3

Here, mystor is the name of the storage account. Note that if the storage account or container is set to private, you first need to make a call to the Azure authentication service to obtain an authorization token and then pass that token through to the REST endpoint header.

Although you could perform these actions manually, the REST APIs are meant for use programmatically.

Microsoft also provides several client libraries that you can use in your applications to make using them more manageable.

However, if you want to access it without writing your software, you can use the azcopy command.

Leave a Reply

Your email address will not be published. Required fields are marked *



          Copyright © 2015-2024 | About | Terms of Service | Privacy Policy