Skip to content

Commit 74c017a

Browse files
Merge pull request #267569 from AbhishekMallick-MS/Feb-28-2024-Security
Security posture and security levels
2 parents 83b5276 + 21c6614 commit 74c017a

File tree

1 file changed

+25
-6
lines changed

1 file changed

+25
-6
lines changed

articles/backup/security-overview.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of security features
33
description: Learn about security capabilities in Azure Backup that help you protect your backup data and meet the security needs of your business.
44
ms.topic: conceptual
5-
ms.date: 03/31/2023
5+
ms.date: 02/29/2024
66
author: AbhishekMallick-MS
77
ms.author: v-abhmallick
88
---
@@ -17,17 +17,17 @@ Storage accounts used by Recovery Services vaults are isolated and can't be acce
1717

1818
Azure Backup provides three [built-in roles](../role-based-access-control/built-in-roles.md) to control backup management operations:
1919

20-
* Backup Contributor - to create and manage backups, except deleting Recovery Services vault and giving access to others
21-
* Backup Operator - everything a contributor does except removing backup and managing backup policies
22-
* Backup Reader - permissions to view all backup management operations
20+
* **Backup Contributor**: To create and manage backups, except deleting Recovery Services vault and giving access to others
21+
* **Backup Operator**: Everything a contributor does except removing backup and managing backup policies
22+
* **Backup Reader**: permissions to view all backup management operations
2323

2424
Learn more about [Azure role-based access control to manage Azure Backup](./backup-rbac-rs-vault.md).
2525

2626
Azure Backup has several security controls built into the service to prevent, detect, and respond to security vulnerabilities. Learn more about [security controls for Azure Backup](./security-baseline.md).
2727

2828
## Separation between guest and Azure storage
2929

30-
With Azure Backup, which includes virtual machine backup and SQL and SAP HANA in VM backup, the backup data is stored in Azure storage and the guest has no direct access to backup storage or its contents. With the virtual machine backup, the backup snapshot creation and storage are done by Azure fabric where the guest has no involvement other than quiescing the workload for application consistent backups. With SQL and SAP HANA, the backup extension gets temporary access to write to specific blobs. In this way, even in a compromised environment, existing backups can't be tampered with or deleted by the guest.
30+
With Azure Backup, which includes virtual machine backup and SQL and SAP HANA in VM backup, the backup data is stored in Azure storage and the guest has no direct access to backup storage or its contents. With the virtual machine backup, the backup snapshot creation and storage are done by Azure fabric where the guest has no involvement other than quiescing the workload for application consistent backups. With SQL and SAP HANA, the backup extension gets temporary access to write to specific blobs. In this way, even in a compromised environment, existing backups can't be tampered with or deleted by the guest.
3131

3232
## Internet connectivity not required for Azure VM backup
3333

@@ -45,7 +45,7 @@ Encryption protects your data and helps you to meet your organizational security
4545

4646
* Within Azure, data in transit between Azure storage and the vault is [protected by HTTPS](backup-support-matrix.md#network-traffic-to-azure). This data remains on the Azure backbone network.
4747

48-
* Backup data is automatically encrypted using [platform-managed keys](backup-encryption.md), and you don't need to take any explicit action to enable it. You can also encrypt your backed up data using [customer managed keys](encryption-at-rest-with-cmk.md) stored in the Azure Key Vault. It applies to all workloads being backed up to your Recovery Services vault.
48+
* Backup data is automatically encrypted using [platform-managed keys](backup-encryption.md), and you don't need to take any explicit action to enable it. You can also encrypt your backed-up data using [customer managed keys](encryption-at-rest-with-cmk.md) stored in the Azure Key Vault. It applies to all workloads being backed up to your Recovery Services vault.
4949

5050
* Azure Backup supports backup and restore of Azure VMs that have their OS/data disks encrypted with [Azure Disk Encryption (ADE)](backup-azure-vms-encryption.md#encryption-support-using-ade) and [VMs with CMK encrypted disks](backup-azure-vms-encryption.md#encryption-using-customer-managed-keys). For more information, [learn more about encrypted Azure VMs and Azure Backup](./backup-azure-vms-encryption.md).
5151

@@ -83,6 +83,25 @@ Azure Backup service uses the Microsoft Azure Recovery Services (MARS) agent to
8383

8484
* For data backed up using the Microsoft Azure Recovery Services (MARS) agent, a passphrase is used to ensure data is encrypted before upload to Azure Backup and decrypted only after download from Azure Backup. The passphrase details are only available to the user who created the passphrase and the agent that's configured with it. Nothing is transmitted or shared with the service. This ensures complete security of your data, as any data that's exposed inadvertently (such as a man-in-the-middle attack on the network) is unusable without the passphrase, and the passphrase isn't sent over the network.
8585

86+
## Security posture and security levels
87+
88+
Azure Backup provides security features at the vault level to safeguard backup data stored in it. These security measures encompass the settings associated with the Azure Backup solution for the vaults, and the protected data sources contained in the vaults.
89+
90+
Security levels for Azure Backup vaults are categorized as follows:
91+
92+
- **Excellent (Maximum)**: This level represents the highest security, which ensures comprehensive protection. You can achieve this when all backup data is protected from accidental deletions and defends from ransomware attacks. To achieve this high level of security, the following conditions must be met:
93+
94+
- [Immutability](backup-azure-immutable-vault-concept.md) or [soft-delete](backup-azure-security-feature-cloud.md) vault setting must be enabled and irreversible (locked/always-on).
95+
- [Multi-user authorization (MUA)](multi-user-authorization-concept.md) must be enabled on the vault.
96+
97+
- **Good (Adequate)**: This signifies a robust security level, which ensures dependable data protection. It shields existing backups from unintended removal and enhances the potential for data recovery. To attain this level of security, you must enable either immutability with a lock or soft-delete.
98+
99+
- **Fair (Minimum/Average)**: This represents a basic level of security, appropriate for standard protection requirements. Essential backup operations benefit from an extra layer of protection. To attain minimal security, you must enable Multi-user Authorization (MUA) on the vault.
100+
101+
- **Poor (Bad/None)**: This indicates a deficiency in security measures, which is less suitable for data protection. In this level, neither advanced protective features nor solely reversible capabilities are in place. The None level security gives protection primarily from accidental deletions only.
102+
103+
You can [view and manage the security levels across all datasources in their respective vaults through Azure Business Continuity Center](../business-continuity-center/security-levels-concept.md).
104+
86105
## Compliance with standardized security requirements
87106

88107
To help organizations comply with national/regional and industry-specific requirements governing the collection and use of individuals' data, Microsoft Azure & Azure Backup offer a comprehensive set of certifications and attestations. [See the list of compliance certifications](compliance-offerings.md)

0 commit comments

Comments
 (0)