Skip to content

Commit 3ccbd4e

Browse files
committed
Freshness update
1 parent 279a99e commit 3ccbd4e

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed

articles/security/fundamentals/paas-applications-using-storage.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,17 @@ title: Securing PaaS applications using Azure Storage | Microsoft Docs
33
description: "Learn about Azure Storage security best practices for securing your PaaS web and mobile applications."
44
services: security
55
documentationcenter: na
6-
author: TomShinder
7-
manager: barbkess
8-
editor: ''
6+
author: terrylanfear
7+
manager: rkarlin
98

109
ms.assetid:
11-
ms.service: storage
12-
ms.subservice: blobs
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1312
ms.topic: article
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 09/28/2018
17-
ms.author: tomsh
15+
ms.date: 01/23/2023
16+
ms.author: terrylan
1817

1918
---
2019
# Best practices for securing PaaS web and mobile applications using Azure Storage
@@ -48,20 +47,20 @@ You still need a way to provide access to objects in storage. To provide more gr
4847

4948
SAS allows you to share content the way you want to share it without giving away your storage account keys. Always using SAS in your application is a secure way to share your storage resources without compromising your storage account keys.
5049

51-
To learn more about shared access signature, see [Using shared access signatures](../../storage/common/storage-sas-overview.md).
50+
To learn more about shared access signature, see [Using shared access signatures](../../storage/common/storage-sas-overview.md).
5251

5352
## Use Azure role-based access control
5453
Another way to manage access is to use [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md). With Azure RBAC, you focus on giving employees the exact permissions they need, based on the need to know and least privilege security principles. Too many permissions can expose an account to attackers. Too few permissions means that employees can't get their work done efficiently. Azure RBAC helps address this problem by offering fine-grained access management for Azure. This is imperative for organizations that want to enforce security policies for data access.
5554

5655
You can use Azure built-in roles in Azure to assign privileges to users. For example, use Storage Account Contributor for cloud operators that need to manage storage accounts and Classic Storage Account Contributor role to manage classic storage accounts. For cloud operators that need to manage VMs but not the virtual network or storage account to which they are connected, you can add them to the Virtual Machine Contributor role.
5756

58-
Organizations that do not enforce data access control by using capabilities such as Azure RBAC may be giving more privileges than necessary for their users. This can lead to data compromise by allowing some users access to data they shouldnt have in the first place.
57+
Organizations that do not enforce data access control by using capabilities such as Azure RBAC may be giving more privileges than necessary for their users. This can lead to data compromise by allowing some users access to data they shouldn't have in the first place.
5958

6059
To learn more about Azure RBAC see:
6160

6261
- [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md)
6362
- [Azure built-in roles](../../role-based-access-control/built-in-roles.md)
64-
- [Azure Storage security guide](../../storage/blobs/security-recommendations.md)
63+
- [Security recommendations for Blob storage](../../storage/blobs/security-recommendations.md)
6564

6665
## Use client-side encryption for high value data
6766
Client-side encryption enables you to programmatically encrypt data in transit before uploading to Azure Storage, and programmatically decrypt data when retrieving it. This provides encryption of data in transit but it also provides encryption of data at rest. Client-side encryption is the most secure method of encrypting your data but it does require you to make programmatic changes to your application and put key management processes in place.

0 commit comments

Comments
 (0)