You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/security-overview.md
+25-6Lines changed: 25 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Overview of security features
3
3
description: Learn about security capabilities in Azure Backup that help you protect your backup data and meet the security needs of your business.
4
4
ms.topic: conceptual
5
-
ms.date: 03/31/2023
5
+
ms.date: 02/29/2024
6
6
author: AbhishekMallick-MS
7
7
ms.author: v-abhmallick
8
8
---
@@ -17,17 +17,17 @@ Storage accounts used by Recovery Services vaults are isolated and can't be acce
17
17
18
18
Azure Backup provides three [built-in roles](../role-based-access-control/built-in-roles.md) to control backup management operations:
19
19
20
-
* Backup Contributor - to create and manage backups, except deleting Recovery Services vault and giving access to others
21
-
* Backup Operator - everything a contributor does except removing backup and managing backup policies
22
-
* Backup Reader - permissions to view all backup management operations
20
+
***Backup Contributor**: To create and manage backups, except deleting Recovery Services vault and giving access to others
21
+
***Backup Operator**: Everything a contributor does except removing backup and managing backup policies
22
+
***Backup Reader**: permissions to view all backup management operations
23
23
24
24
Learn more about [Azure role-based access control to manage Azure Backup](./backup-rbac-rs-vault.md).
25
25
26
26
Azure Backup has several security controls built into the service to prevent, detect, and respond to security vulnerabilities. Learn more about [security controls for Azure Backup](./security-baseline.md).
27
27
28
28
## Separation between guest and Azure storage
29
29
30
-
With Azure Backup, which includes virtual machine backup and SQL and SAP HANA in VM backup, the backup data is stored in Azure storage and the guest has no direct access to backup storage or its contents. With the virtual machine backup, the backup snapshot creation and storage are done by Azure fabric where the guest has no involvement other than quiescing the workload for application consistent backups. With SQL and SAP HANA, the backup extension gets temporary access to write to specific blobs. In this way, even in a compromised environment, existing backups can't be tampered with or deleted by the guest.
30
+
With Azure Backup, which includes virtual machine backup and SQL and SAP HANA in VM backup, the backup data is stored in Azure storage and the guest has no direct access to backup storage or its contents. With the virtual machine backup, the backup snapshot creation and storage are done by Azure fabric where the guest has no involvement other than quiescing the workload for application consistent backups. With SQL and SAP HANA, the backup extension gets temporary access to write to specific blobs. In this way, even in a compromised environment, existing backups can't be tampered with or deleted by the guest.
31
31
32
32
## Internet connectivity not required for Azure VM backup
33
33
@@ -45,7 +45,7 @@ Encryption protects your data and helps you to meet your organizational security
45
45
46
46
* Within Azure, data in transit between Azure storage and the vault is [protected by HTTPS](backup-support-matrix.md#network-traffic-to-azure). This data remains on the Azure backbone network.
47
47
48
-
* Backup data is automatically encrypted using [platform-managed keys](backup-encryption.md), and you don't need to take any explicit action to enable it. You can also encrypt your backedup data using [customer managed keys](encryption-at-rest-with-cmk.md) stored in the Azure Key Vault. It applies to all workloads being backed up to your Recovery Services vault.
48
+
* Backup data is automatically encrypted using [platform-managed keys](backup-encryption.md), and you don't need to take any explicit action to enable it. You can also encrypt your backed-up data using [customer managed keys](encryption-at-rest-with-cmk.md) stored in the Azure Key Vault. It applies to all workloads being backed up to your Recovery Services vault.
49
49
50
50
* Azure Backup supports backup and restore of Azure VMs that have their OS/data disks encrypted with [Azure Disk Encryption (ADE)](backup-azure-vms-encryption.md#encryption-support-using-ade) and [VMs with CMK encrypted disks](backup-azure-vms-encryption.md#encryption-using-customer-managed-keys). For more information, [learn more about encrypted Azure VMs and Azure Backup](./backup-azure-vms-encryption.md).
51
51
@@ -83,6 +83,25 @@ Azure Backup service uses the Microsoft Azure Recovery Services (MARS) agent to
83
83
84
84
* For data backed up using the Microsoft Azure Recovery Services (MARS) agent, a passphrase is used to ensure data is encrypted before upload to Azure Backup and decrypted only after download from Azure Backup. The passphrase details are only available to the user who created the passphrase and the agent that's configured with it. Nothing is transmitted or shared with the service. This ensures complete security of your data, as any data that's exposed inadvertently (such as a man-in-the-middle attack on the network) is unusable without the passphrase, and the passphrase isn't sent over the network.
85
85
86
+
## Security posture and security levels
87
+
88
+
Azure Backup provides security features at the vault level to safeguard backup data stored in it. These security measures encompass the settings associated with the Azure Backup solution for the vaults, and the protected data sources contained in the vaults.
89
+
90
+
Security levels for Azure Backup vaults are categorized as follows:
91
+
92
+
-**Excellent (Maximum)**: This level represents the highest security, which ensures comprehensive protection. You can achieve this when all backup data is protected from accidental deletions and defends from ransomware attacks. To achieve this high level of security, the following conditions must be met:
93
+
94
+
-[Immutability](backup-azure-immutable-vault-concept.md) or [soft-delete](backup-azure-security-feature-cloud.md) vault setting must be enabled and irreversible (locked/always-on).
95
+
-[Multi-user authorization (MUA)](multi-user-authorization-concept.md) must be enabled on the vault.
96
+
97
+
-**Good (Adequate)**: This signifies a robust security level, which ensures dependable data protection. It shields existing backups from unintended removal and enhances the potential for data recovery. To attain this level of security, you must enable either immutability with a lock or soft-delete.
98
+
99
+
-**Fair (Minimum/Average)**: This represents a basic level of security, appropriate for standard protection requirements. Essential backup operations benefit from an extra layer of protection. To attain minimal security, you must enable Multi-user Authorization (MUA) on the vault.
100
+
101
+
-**Poor (Bad/None)**: This indicates a deficiency in security measures, which is less suitable for data protection. In this level, neither advanced protective features nor solely reversible capabilities are in place. The None level security gives protection primarily from accidental deletions only.
102
+
103
+
You can [view and manage the security levels across all datasources in their respective vaults through Azure Business Continuity Center](../business-continuity-center/security-levels-concept.md).
104
+
86
105
## Compliance with standardized security requirements
87
106
88
107
To help organizations comply with national/regional and industry-specific requirements governing the collection and use of individuals' data, Microsoft Azure & Azure Backup offer a comprehensive set of certifications and attestations. [See the list of compliance certifications](compliance-offerings.md)
0 commit comments