You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-security-feature-cloud.md
+28-15Lines changed: 28 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.date: 09/13/2019
6
6
---
7
7
# Security features to help protect cloud workloads that use Azure Backup
8
8
9
-
Concerns about security issues, like malware, ransomware, and intrusion, are increasing. These security issues can be costly, in terms of both money and data. To guard against such attacks, Azure Backup now provides security features to help protect backup data even after deletion. One such feature is soft delete. With soft delete, even if a malicious actor deletes the backup of a VM (or backup data is accidentally deleted), the backup data is retained for 14 additional days, allowing the recovery of that backup item with no data loss. These additional 14 days retention of backup data in the "soft delete" state don’t incur any cost to the customer. Azure also encrypts all the backedup data at rest using [Storage Service Encryption](https://docs.microsoft.com/azure/storage/common/storage-service-encryption) to further secure your data.
9
+
Concerns about security issues, like malware, ransomware, and intrusion, are increasing. These security issues can be costly, in terms of both money and data. To guard against such attacks, Azure Backup now provides security features to help protect backup data even after deletion. One such feature is soft delete. With soft delete, even if a malicious actor deletes the backup of a VM (or backup data is accidentally deleted), the backup data is retained for 14 additional days, allowing the recovery of that backup item with no data loss. These additional 14 days retention of backup data in the "soft delete" state don’t incur any cost to the customer. Azure also encrypts all the backed-up data at rest using [Storage Service Encryption](https://docs.microsoft.com/azure/storage/common/storage-service-encryption) to further secure your data.
10
10
11
11
> [!NOTE]
12
12
> Soft delete only protects deleted backup data. If a VM is deleted without a backup, the soft-delete feature will not preserve the data. All resources should be protected with Azure Backup to ensure full resilience.
@@ -20,7 +20,7 @@ Soft delete is currently supported in the West Central US, East Asia, Canada Cen
20
20
21
21
### Soft delete for VMs using Azure portal
22
22
23
-
1.In order to delete the backup data of a VM, the backup must be stopped. In the Azure portal, go to your recovery services vault, right-click on the backup item and choose **Stop backup**.
23
+
1.To delete the backup data of a VM, the backup must be stopped. In the Azure portal, go to your recovery services vault, right-click on the backup item and choose **Stop backup**.
24
24
25
25

26
26
@@ -35,7 +35,7 @@ Soft delete is currently supported in the West Central US, East Asia, Canada Cen
35
35
> [!NOTE]
36
36
> If any soft-deleted backup items are present in the vault, the vault cannot be deleted at that time. Please try vault deletion after the backup items are permanently deleted, and there is no item in soft deleted state left in the vault.
37
37
38
-
4.In order to restore the soft-deleted VM, it must first be undeleted. To undelete, choose the soft-deleted VM, and then select the option **Undelete**.
38
+
4.To restore the soft-deleted VM, it must first be undeleted. To undelete, choose the soft-deleted VM, and then select the option **Undelete**.
39
39
40
40

41
41
@@ -83,7 +83,7 @@ The 'DeleteState' of the backup item will change from 'NotDeleted' to 'ToBeDelet
83
83
84
84
#### Undoing the deletion operation using Azure Powershell
85
85
86
-
First, fetch the relevant backup item that is in soft-delete state i.e., about to be deleted
86
+
First, fetch the relevant backup item that is in soft-delete state (that is, about to be deleted).
87
87
88
88
```powershell
89
89
@@ -158,7 +158,7 @@ Backup data in soft deleted state prior disabling this feature, will remain in s
158
158
Follow these steps:
159
159
160
160
1. Follow the steps to [disable soft delete](#disabling-soft-delete).
161
-
2. In the Azure portal, go to your vault, go to **Backup Items** and choose the soft deleted VM
161
+
2. In the Azure portal, go to your vault, go to **Backup Items**, and choose the soft deleted VM.
@@ -226,33 +226,46 @@ If items were deleted before soft-delete was disabled, then they will be in a so
226
226
2. Then disable the soft-delete functionality using REST API using the steps mentioned [here](use-restapi-update-vault-properties.md#update-soft-delete-state-using-rest-api).
227
227
3. Then delete the backups using REST API as mentioned [here](backup-azure-arm-userestapi-backupazurevms.md#stop-protection-and-delete-data).
228
228
229
-
## Other security features
229
+
## Encryption
230
230
231
-
### Storage side encryption
231
+
### Encryption of backup data using Microsoft managed keys
232
232
233
-
Azure Storage automatically encrypts your data when persisting it to the cloud. Encryption protects your data and to help you to meet your organizational security and compliance commitments. Data in Azure Storage is encrypted and decrypted transparently using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. Azure Storage encryption is similar to BitLocker encryption on Windows. Azure Backup automatically encrypts data before storing it. Azure Storage decrypts data before retrieving it.
233
+
Backup data is automatically encrypted using Azure Storage encryption. Encryption protects your data and helps you to meet your organizational security and compliance commitments. Data is encrypted and decrypted transparently using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. Azure Storage encryption is similar to BitLocker encryption on Windows.
234
234
235
235
Within Azure, data in transit between Azure storage and the vault is protected by HTTPS. This data remains on the Azure backbone network.
236
236
237
-
For more information, please see [Azure Storage encryption for data at rest](https://docs.microsoft.com/azure/storage/common/storage-service-encryption). Please refer to the [Azure Backup FAQ](https://docs.microsoft.com/azure/backup/backup-azure-backup-faq#encryption) to answer any questions that you may have about encryption.
237
+
For more information, see [Azure Storage encryption for data at rest](https://docs.microsoft.com/azure/storage/common/storage-service-encryption). Refer to the [Azure Backup FAQ](https://docs.microsoft.com/azure/backup/backup-azure-backup-faq#encryption) to answer any questions that you may have about encryption.
238
+
239
+
### Encryption of backup data using customer managed keys
240
+
241
+
While backing up Azure Virtual Machines, you also have the option to encrypt your backup data in the Recovery Services Vault using your encryption keys stored in the Azure Key Vault.
242
+
243
+
>[!NOTE]
244
+
>This feature is currently under early use. Fill out [this survey](https://forms.microsoft.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR0H3_nezt2RNkpBCUTbWEapURE9TTDRIUEUyNFhNT1lZS1BNVDdZVllHWi4u) if you wish to encrypt your backup data using customer managed keys. Note that the ability to use this feature is subject to approval from the Azure Backup service.
238
245
239
-
### VM encryption
246
+
### Backup of managed disk VM encrypted using customer managed keys
240
247
241
-
You can back up and restore Windows or Linux Azure virtual machines (VMs) with encrypted disks using the Azure Backup service. For instructions, please see [Back up and restore encrypted virtual machines with Azure Backup](https://docs.microsoft.com/azure/backup/backup-azure-vms-encryption).
248
+
Azure Backup allows you to back up Azure Virtual Machines containing disks encrypted using customer managed keys. For details, refer to [Encryption of managed disks with customer managed keys](https://docs.microsoft.com//azure/virtual-machines/windows/disk-encryption#customer-managed-keys-public-preview).
249
+
250
+
### Backup of encrypted VMs
251
+
252
+
You can back up and restore Windows or Linux Azure virtual machines (VMs) with encrypted disks using the Azure Backup service. For instructions, see [Back up and restore encrypted virtual machines with Azure Backup](https://docs.microsoft.com/azure/backup/backup-azure-vms-encryption).
253
+
254
+
## Other security features
242
255
243
256
### Protection of Azure Backup recovery points
244
257
245
258
Storage accounts used by recovery services vaults are isolated and cannot be accessed by users for any malicious purposes. The access is only allowed through Azure Backup management operations, such as restore. These management operations are controlled through Role-Based Access Control (RBAC).
246
259
247
-
For more information, please see [Use Role-Based Access Control to manage Azure Backup recovery points](https://docs.microsoft.com/azure/backup/backup-rbac-rs-vault).
260
+
For more information, see [Use Role-Based Access Control to manage Azure Backup recovery points](https://docs.microsoft.com/azure/backup/backup-rbac-rs-vault).
248
261
249
262
## Frequently asked questions
250
263
251
264
### For Soft delete
252
265
253
266
#### Do I need to enable the soft-delete feature on every vault?
254
267
255
-
No, it is built and enabled by default for all the recovery services vaults.
268
+
No, it's built and enabled by default for all the recovery services vaults.
256
269
257
270
#### Can I configure the number of days for which my data will be retained in soft-deleted state after delete operation is complete?
258
271
@@ -276,11 +289,11 @@ Undelete followed by resume operation will protect the resource again. Resume op
276
289
277
290
#### Can I delete my vault if there are soft deleted items in the vault?
278
291
279
-
The Recovery Services vault cannot be deleted if there are backup items in soft-deleted state in the vault. The soft-deleted items are permanently deleted 14 days after the delete operation. If you cannot wait for 14 days, then [disable soft delete](#disabling-soft-delete), undelete the soft deleted items, and delete them again to permanently get deleted. After ensuring there are no protected items and no soft deleted items the vault can be deleted.
292
+
The Recovery Services vault cannot be deleted if there are backup items in soft-deleted state in the vault. The soft-deleted items are permanently deleted 14 days after the delete operation. If you cannot wait for 14 days, then [disable soft delete](#disabling-soft-delete), undelete the soft deleted items, and delete them again to permanently get deleted. After ensuring there are no protected items and no soft deleted items, the vault can be deleted.
280
293
281
294
#### Can I delete the data earlier than the 14 days soft-delete period after deletion?
282
295
283
-
No. You cannot force delete the soft-deleted items, they are automatically deleted after 14 days. This security feature is enabled to safeguard the backed-up data from accidental or malicious deletes. You should wait for 14 day before performing any other action on the VM. Soft-deleted items will not be charged. If you need re-protecting the VMs marked for soft-delete within 14 days to a new vault, then contact Microsoft support.
296
+
No. You cannot force delete the soft-deleted items, they are automatically deleted after 14 days. This security feature is enabled to safeguard the backed-up data from accidental or malicious deletes. You should wait for 14 day before performing any other action on the VM. Soft-deleted items will not be charged. If you need reprotecting the VMs marked for soft-delete within 14 days to a new vault, then contact Microsoft support.
284
297
285
298
#### Can soft delete operations be performed in PowerShell or CLI?
0 commit comments