You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/paas-applications-using-storage.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,18 +3,17 @@ title: Securing PaaS applications using Azure Storage | Microsoft Docs
3
3
description: "Learn about Azure Storage security best practices for securing your PaaS web and mobile applications."
4
4
services: security
5
5
documentationcenter: na
6
-
author: TomShinder
7
-
manager: barbkess
8
-
editor: ''
6
+
author: terrylanfear
7
+
manager: rkarlin
9
8
10
9
ms.assetid:
11
-
ms.service: storage
12
-
ms.subservice: blobs
10
+
ms.service: security
11
+
ms.subservice: security-fundamentals
13
12
ms.topic: article
14
13
ms.tgt_pltfrm: na
15
14
ms.workload: na
16
-
ms.date: 09/28/2018
17
-
ms.author: tomsh
15
+
ms.date: 01/23/2023
16
+
ms.author: terrylan
18
17
19
18
---
20
19
# Best practices for securing PaaS web and mobile applications using Azure Storage
@@ -48,20 +47,20 @@ You still need a way to provide access to objects in storage. To provide more gr
48
47
49
48
SAS allows you to share content the way you want to share it without giving away your storage account keys. Always using SAS in your application is a secure way to share your storage resources without compromising your storage account keys.
50
49
51
-
To learn more about shared access signature, see [Using shared access signatures](../../storage/common/storage-sas-overview.md).
50
+
To learn more about shared access signature, see [Using shared access signatures](../../storage/common/storage-sas-overview.md).
52
51
53
52
## Use Azure role-based access control
54
53
Another way to manage access is to use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). With Azure RBAC, you focus on giving employees the exact permissions they need, based on the need to know and least privilege security principles. Too many permissions can expose an account to attackers. Too few permissions means that employees can't get their work done efficiently. Azure RBAC helps address this problem by offering fine-grained access management for Azure. This is imperative for organizations that want to enforce security policies for data access.
55
54
56
55
You can use Azure built-in roles in Azure to assign privileges to users. For example, use Storage Account Contributor for cloud operators that need to manage storage accounts and Classic Storage Account Contributor role to manage classic storage accounts. For cloud operators that need to manage VMs but not the virtual network or storage account to which they are connected, you can add them to the Virtual Machine Contributor role.
57
56
58
-
Organizations that do not enforce data access control by using capabilities such as Azure RBAC may be giving more privileges than necessary for their users. This can lead to data compromise by allowing some users access to data they shouldn’t have in the first place.
57
+
Organizations that do not enforce data access control by using capabilities such as Azure RBAC may be giving more privileges than necessary for their users. This can lead to data compromise by allowing some users access to data they shouldn't have in the first place.
59
58
60
59
To learn more about Azure RBAC see:
61
60
62
61
-[Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md)
-[Security recommendations for Blob storage](../../storage/blobs/security-recommendations.md)
65
64
66
65
## Use client-side encryption for high value data
67
66
Client-side encryption enables you to programmatically encrypt data in transit before uploading to Azure Storage, and programmatically decrypt data when retrieving it. This provides encryption of data in transit but it also provides encryption of data at rest. Client-side encryption is the most secure method of encrypting your data but it does require you to make programmatic changes to your application and put key management processes in place.
0 commit comments