Skip to content

Commit 128a7a5

Browse files
Merge pull request #216351 from jimmart-dev/jammart-blobs-anon-access-warn
add warning to doc about preventing public anon access
2 parents 6a0e90d + 8a4f297 commit 128a7a5

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed

articles/storage/blobs/anonymous-read-access-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 03/01/2022
10+
ms.date: 10/28/2022
1111
ms.author: jammart
1212
ms.reviewer: fryu
1313
ms.subservice: blobs
14-
ms.custom: devx-track-azurepowershell, devx-track-azurecli
14+
ms.custom: devx-track-azurepowershell, devx-track-azurecli, engagement-fy23
1515
ms.devlang: azurecli
1616
---
1717

articles/storage/blobs/anonymous-read-access-prevent.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,25 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 12/09/2020
10+
ms.date: 10/28/2022
1111
ms.author: jammart
1212
ms.reviewer: fryu
1313
ms.subservice: blobs
14-
ms.custom: devx-track-azurepowershell
14+
ms.custom: devx-track-azurepowershell, engagement-fy23
1515
---
1616

1717
# Prevent anonymous public read access to containers and blobs
1818

19+
This article describes how to use a DRAG (Detection-Remediation-Audit-Governance) framework to continuously manage public access for your storage accounts.
20+
1921
Anonymous public read access to containers and blobs in Azure Storage is a convenient way to share data, but may also present a security risk. It's important to manage anonymous access judiciously and to understand how to evaluate anonymous access to your data. Operational complexity, human error, or malicious attack against data that is publicly accessible can result in costly data breaches. Microsoft recommends that you enable anonymous access only when necessary for your application scenario.
2022

2123
By default, public access to your blob data is always prohibited. However, the default configuration for a storage account permits a user with appropriate permissions to configure public access to containers and blobs in a storage account. For enhanced security, you can disallow all public access to storage account, regardless of the public access setting for an individual container. Disallowing public access to the storage account prevents a user from enabling public access for a container in the account. Microsoft recommends that you disallow public access to a storage account unless your scenario requires it. Disallowing public access helps to prevent data breaches caused by undesired anonymous access.
2224

2325
When you disallow public blob access for the storage account, Azure Storage rejects all anonymous requests to that account. After public access is disallowed for an account, containers in that account cannot be subsequently configured for public access. Any containers that have already been configured for public access will no longer accept anonymous requests. For more information, see [Configure anonymous public read access for containers and blobs](anonymous-read-access-configure.md).
2426

25-
This article describes how to use a DRAG (Detection-Remediation-Audit-Governance) framework to continuously manage public access for your storage accounts.
27+
> [!WARNING]
28+
> When a container is configured for public access, any client can read data in that container. Public access presents a potential security risk, so if your scenario does not require it, Microsoft recommends that you disallow it for the storage account.
2629
2730
## Detect anonymous requests from client applications
2831

0 commit comments

Comments
 (0)