Skip to content

Commit 1b0c261

Browse files
Merge pull request #225688 from TerryLanfear/sec-01fresh
Freshness update
2 parents 96d87c7 + 4a7bbf0 commit 1b0c261

File tree

1 file changed

+14
-17
lines changed

1 file changed

+14
-17
lines changed

articles/security/fundamentals/paas-applications-using-storage.md

Lines changed: 14 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,17 @@ title: Securing PaaS applications using Azure Storage | Microsoft Docs
33
description: "Learn about Azure Storage security best practices for securing your PaaS web and mobile applications."
44
services: security
55
documentationcenter: na
6-
author: TomShinder
7-
manager: barbkess
8-
editor: ''
6+
author: terrylanfear
7+
manager: rkarlin
98

109
ms.assetid:
11-
ms.service: storage
12-
ms.subservice: blobs
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1312
ms.topic: article
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 09/28/2018
17-
ms.author: tomsh
15+
ms.date: 01/23/2023
16+
ms.author: terrylan
1817

1918
---
2019
# Best practices for securing PaaS web and mobile applications using Azure Storage
@@ -24,8 +23,6 @@ Azure makes it possible to deploy and use storage in ways not easily achievable
2423

2524
Azure Storage provides the following four services: Blob storage, Table storage, Queue storage, and File storage. To learn more, see [Introduction to Microsoft Azure Storage](../../storage/common/storage-introduction.md).
2625

27-
The [Azure Storage security guide](../../storage/blobs/security-recommendations.md) is a great source for detailed information about Azure Storage and security. This best practices article addresses at a high level some of the concepts found in the security guide and links to the security guide, as well as other sources, for more information.
28-
2926
This article addresses the following best practices:
3027

3128
- Shared access signatures (SAS)
@@ -37,9 +34,9 @@ This article addresses the following best practices:
3734
## Use a shared access signature instead of a storage account key
3835
Access control is critical. To help you control access to Azure Storage, Azure generates two 512-bit storage account keys (SAKs) when you create a storage account. The level of key redundancy makes it possible for you to avoid service interruptions during routine key rotation.
3936

40-
Storage access keys are high priority secrets and should only be accessible to those responsible for storage access control. If the wrong people get access to these keys, they will have complete control of storage and could replace, delete, or add files to storage. This includes malware and other types of content that can potentially compromise your organization or your customers.
37+
Storage access keys are high priority secrets and should only be accessible to people responsible for storage access control. If the wrong people get access to these keys, they'll have complete control of storage and could replace, delete, or add files to storage. This includes malware and other types of content that can potentially compromise your organization or your customers.
4138

42-
You still need a way to provide access to objects in storage. To provide more granular access you can take advantage of shared access signature (SAS). The SAS makes it possible for you to share specific objects in storage for a pre-defined time-interval and with specific permissions. A shared access signature allows you to define:
39+
You still need a way to provide access to objects in storage. To provide more granular access, you can take advantage of shared access signature (SAS). The SAS makes it possible for you to share specific objects in storage for a pre-defined time-interval and with specific permissions. A shared access signature allows you to define:
4340

4441
- The interval over which the SAS is valid, including the start time and the expiry time.
4542
- The permissions granted by the SAS. For example, a SAS on a blob might grant a user read and write permissions to that blob, but not delete permissions.
@@ -48,23 +45,23 @@ You still need a way to provide access to objects in storage. To provide more gr
4845

4946
SAS allows you to share content the way you want to share it without giving away your storage account keys. Always using SAS in your application is a secure way to share your storage resources without compromising your storage account keys.
5047

51-
To learn more about shared access signature, see [Using shared access signatures](../../storage/common/storage-sas-overview.md).
48+
To learn more about shared access signature, see [Using shared access signatures](../../storage/common/storage-sas-overview.md).
5249

5350
## Use Azure role-based access control
54-
Another way to manage access is to use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). With Azure RBAC, you focus on giving employees the exact permissions they need, based on the need to know and least privilege security principles. Too many permissions can expose an account to attackers. Too few permissions means that employees can't get their work done efficiently. Azure RBAC helps address this problem by offering fine-grained access management for Azure. This is imperative for organizations that want to enforce security policies for data access.
51+
Another way to manage access is to use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). With Azure RBAC, you focus on giving employees the exact permissions they need, based on the need to know and least privilege security principles. Too many permissions can expose an account to attackers. Too few permissions means that employees can't get their work done efficiently. Azure RBAC helps address this problem by offering fine-grained access management for Azure. Access control is imperative for organizations that want to enforce security policies for data access.
5552

56-
You can use Azure built-in roles in Azure to assign privileges to users. For example, use Storage Account Contributor for cloud operators that need to manage storage accounts and Classic Storage Account Contributor role to manage classic storage accounts. For cloud operators that need to manage VMs but not the virtual network or storage account to which they are connected, you can add them to the Virtual Machine Contributor role.
53+
You can use Azure built-in roles in Azure to assign privileges to users. For example, use Storage Account Contributor for cloud operators that need to manage storage accounts and Classic Storage Account Contributor role to manage classic storage accounts. For cloud operators that need to manage VMs but not the virtual network or storage account to which they're connected, you can add them to the Virtual Machine Contributor role.
5754

58-
Organizations that do not enforce data access control by using capabilities such as Azure RBAC may be giving more privileges than necessary for their users. This can lead to data compromise by allowing some users access to data they shouldnt have in the first place.
55+
Organizations that don't enforce data access control by using capabilities such as Azure RBAC may be giving more privileges than necessary for their users. More privileges than necessary can lead to data compromise by allowing some users access to data they shouldn't have in the first place.
5956

6057
To learn more about Azure RBAC see:
6158

6259
- [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md)
6360
- [Azure built-in roles](../../role-based-access-control/built-in-roles.md)
64-
- [Azure Storage security guide](../../storage/blobs/security-recommendations.md)
61+
- [Security recommendations for Blob storage](../../storage/blobs/security-recommendations.md)
6562

6663
## Use client-side encryption for high value data
67-
Client-side encryption enables you to programmatically encrypt data in transit before uploading to Azure Storage, and programmatically decrypt data when retrieving it. This provides encryption of data in transit but it also provides encryption of data at rest. Client-side encryption is the most secure method of encrypting your data but it does require you to make programmatic changes to your application and put key management processes in place.
64+
Client-side encryption enables you to programmatically encrypt data in transit before uploading to Azure Storage, and programmatically decrypt data when retrieving it. Client-side encryption provides encryption of data in transit but it also provides encryption of data at rest. Client-side encryption is the most secure method of encrypting your data but it does require you to make programmatic changes to your application and put key management processes in place.
6865

6966
Client-side encryption also enables you to have sole control over your encryption keys. You can generate and manage your own encryption keys. It uses an envelope technique where the Azure storage client library generates a content encryption key (CEK) that is then wrapped (encrypted) using the key encryption key (KEK). The KEK is identified by a key identifier and can be an asymmetric key pair or a symmetric key and can be managed locally or stored in [Azure Key Vault](../../key-vault/general/overview.md).
7067

0 commit comments

Comments
 (0)