Skip to content

Commit a3cec04

Browse files
authored
Merge pull request #68774 from monhaber/release-asc-monica-test
Advanced Threat Protection updates
2 parents d372e01 + ff3ad10 commit a3cec04

File tree

7 files changed

+91
-25
lines changed

7 files changed

+91
-25
lines changed
-82.1 KB
Loading

articles/storage/blobs/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@
139139
href: storage-https-custom-domain-cdn.md
140140
- name: Immutable blobs
141141
href: storage-blob-immutable-storage.md
142-
- name: Advanced Threat Protection (preview)
142+
- name: Advanced Threat Protection
143143
href: ../common/storage-advanced-threat-protection.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
144144
- name: Enable secure TLS for Azure Storage client
145145
href: ../common/storage-security-tls.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json
-4.81 KB
Loading
180 KB
Loading
18.8 KB
Loading

articles/storage/common/storage-advanced-threat-protection.md

Lines changed: 89 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,76 @@
11
---
2-
title: Monitoring Threats in Azure Storage
2+
title: Advanced Threat Protection for Azure Storage
33
description: Configure Azure Storage Advanced Threat Protection to detect anomalies in account activity and notify you of potentially harmful attempts to access your account.
44
services: storage
55
author: rmatchoro
66
ms.service: storage
77
ms.topic: article
8-
ms.date: 09/24/2018
9-
ms.author: ronmat
8+
ms.date: 03/11/2019
9+
ms.author: monhaber
1010
ms.manager: shaik
1111
---
1212

13-
# Azure Storage Advanced Threat Protection
13+
# Advanced Threat Protection for Azure Storage
1414

15-
Azure Storage Advanced Threat Protection detects anomalies in account activity and notifies you of potentially harmful attempts to access your account. This layer of protection allows you to address threats without the need to be a security expert or manage security monitoring systems.
15+
Advanced Threat Protection for Azure Storage provides an additional layer of security intelligence that detects unusual and potentially harmful attempts to access or exploit storage accounts. This layer of protection allows you to address threats without the need to be a security expert or manage security monitoring systems.
1616

17-
Threats are surfaced by defining security alerts that trigger when anomalies in activity occur. These alerts integrate with [Azure Security Center](https://azure.microsoft.com/services/security-center/) which include details of suspicious activity and recommendations on how to investigate and remediate threats.
17+
Security alerts are triggered when anomalies in activity occur. These security alerts are integrated with [Azure Security Center](https://azure.microsoft.com/services/security-center/), and are also sent via email to subscription administrators, with details of suspicious activity and recommendations on how to investigate and remediate threats.
1818

1919
> [!NOTE]
20-
> Azure Storage Advanced Threat Protection is currently available only for the Blob service. Security alerts are integrated with Azure Security Center and are sent via email to subscription administrators.
20+
> Advanced Threat Protection for Azure Storage is currently available only for the Blob storage. Details about the new pricing is available in the [Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-pricing) pricing page, including an option for a trial period for the first 30 days without charge.
2121
22-
Azure Storage Advanced Threat Protection ingests diagnostic logs of read, write and delete requests to Blob service for threat detection. To investigate the alerts from Advanced Threat Protection, you need to [configure diagnostics logs](storage-monitor-storage-account.md#configure-logging) to enable all levels of logs for the Blob service.
22+
Advanced Threat Protection for Azure Storage ingests diagnostic logs of read, write, and delete requests to Blob storage for threat detection. To investigate the alerts from Advanced Threat Protection, you can view related storage activity using Storage Analytics Logging. For more information, see how to [configure Storage Analytics logging](storage-monitor-storage-account.md#configure-logging).
2323

24-
## Set up Advanced Threat Protection in the portal
24+
## Set up Advanced Threat Protection
25+
26+
### Using the portal
2527

2628
1. Launch the Azure portal at [https://portal.azure.com](https://portal.azure.com/).
2729

2830
2. Navigate to the configuration page of the Azure Storage account you want to protect. In the **Settings** page, select **Advanced Threat Protection**.
2931

3032
3. In the **Advanced Threat Protection** configuration blade
3133
* Turn **ON** Advanced *Threat Protection*
32-
* Click **Save** to save the new or updated Advanced Threat Protection policy.
34+
* Click **Save** to save the new or updated Advanced Threat Protection policy. (Prices in the image are for example purposes only.)
3335

3436
![Turn on Azure Storage advanced threat protection](./media/storage-advanced-threat-protection/storage-advanced-threat-protection-turn-on.png)
3537

36-
## Explore anomalies
38+
### Using Azure Security Center
39+
When you subscribe to the Standard tier in Azure Security Center, Advanced Threat Protection is set up on your storage accounts. For more information see [Upgrade to Security Center's Standard tier for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-pricing). (Prices in the image are for example purposes only.)
40+
41+
![Standard tier in ASC](./media/storage-advanced-threat-protection/storage-advanced-threat-protection-pricing.png)
42+
43+
### Using Azure Resource Manager templates
44+
45+
Use an Azure Resource Manager template to deploy an Azure Storage account with Advanced Threat Protection enabled.
46+
For more information, see
47+
[Storage account with Advanced Threat Protection](https://azure.microsoft.com/resources/templates/201-storage-advanced-threat-protection-create/).
48+
49+
### Using REST API
50+
Use Rest API commands to create, update, or get the Advanced Threat Protection setting for a specific storage account.
51+
52+
* [Advanced Threat Protection - Create](https://docs.microsoft.com/rest/api/securitycenter/advancedthreatprotection/create)
53+
* [Advanced Threat Protection - Get](https://docs.microsoft.com/rest/api/securitycenter/advancedthreatprotection/get)
54+
55+
<!-- ### Using Azure PowerShell-->
56+
<!-- -->
57+
<!-- Use the following PowerShell cmdlets:-->
58+
<!-- * Enable Advanced Threat Protection-->
59+
<!-- * Get Advanced Threat Protection -->
60+
<!--* Disable Advanced Threat Protection -->
61+
62+
## Explore security anomalies
3763

3864
When storage activity anomalies occur, you receive an email notification with information about the suspicious security event. Details of the event include:
3965

40-
* nature of the anomaly
41-
* storage account name
42-
* storage type
43-
* event time
66+
* The nature of the anomaly
67+
* The storage account name
68+
* The event time
69+
* The storage type
70+
* The potential causes
71+
* The investigation steps
72+
* The remediation steps
73+
4474

4575
The email also includes details on possible causes and recommended actions to investigate and mitigate the potential threat.
4676

@@ -54,18 +84,54 @@ You can review and manage your current security alerts from Azure Security Cente
5484

5585
Alerts are generated by unusual and potentially harmful attempts to access or exploit storage accounts. These events can trigger the following alerts:
5686

57-
* **Access from unusual location**: This alert is triggered when there's a change in the access pattern to a storage account. For instance, when someone has accessed a storage account from an unusual geographical location. In some cases, the alert detects a legitimate action (a new application or developer’s maintenance operation). In other cases, the alert detects a malicious action (former employee, external attacker, etc.).
87+
### Anomalous access pattern alerts
88+
89+
* **Access from unusual location**: This alert is triggered when there's a change in the access pattern to a storage account. For instance, when someone has accessed a storage account from an unusual geographical location.
90+
Potential causes:
91+
* An attacker has accessed your storage account
92+
* A legitimate user has accessed your storage account from a new location
93+
94+
* **Application Anomaly**: This alert indicates that an unusual application has accessed this storage account. Potential causes:
95+
* An attacker has accessed your storage account using a new application.
96+
* A legitimate user has used a new application/browser to access your storage account.
97+
98+
* **Anonymous access**: This alert indicates that there is a change in the access pattern to a storage account. For example, this account has been accessed anonymously (i.e. without any authentication), which is unexpected compared to the recent access pattern on this account.
99+
Potential causes:
100+
* An attacker has exploited public read access to a container.
101+
* A legitimate user or application has used public read access to a container.
102+
103+
### Anomalous extract/upload alerts
104+
105+
* **Data Exfiltration**: This alert indicates that an unusually large amount of data has been extracted compared to recent activity on this storage container. Potential causes:
106+
* An attacker has extracted a large amount of data from a container. (For example: data exfiltration/breach, unauthorized transfer of data)
107+
* A legitimate user or application has extracted an unusual amount of data from a container. (For example: maintenance activity)
108+
109+
* **Unexpected delete**: This alert indicates that one or more unexpected delete operations has occurred in a storage account, compared to recent activity on this account. Potential causes:
110+
* An attacker has deleted data from your storage account.
111+
* A legitimate user has performed an unusual deletion.
112+
113+
* **Upload Azure Cloud Service package**: This alert indicates that an Azure Cloud Service package (.cspkg file) has been uploaded to a storage account in an unusual way, compared to recent activity on this account. Potential causes:
114+
* An attacker has been preparing to deploy malicious code from your storage account to an Azure cloud service.
115+
* A legitimate user has been preparing for a legitimate service deployment.
116+
117+
### Suspicious storage activities alerts
118+
119+
* **Access permission change**: This alert indicates that the access permissions of this storage container have been changed in an unusual way. Potential causes:
120+
* An attacker has changed container permissions to weaken its security.
121+
* A legitimate user has changed container permissions.
122+
123+
* **Access Inspection**: This alert indicates that the access permissions of a storage account have been inspected in an unusual way, compared to recent activity on this account. Potential causes:
124+
* An attacker has performed reconnaissance for a future attack.
125+
* A legitimate user has performed maintenance on the storage account.
126+
127+
* **Data Exploration**: This alert indicates that blobs or containers in a storage account have been enumerated in an unusual way, compared to recent activity on this account. Potential causes:
128+
* An attacker has performed reconnaissance for a future attack.
129+
* A legitimate user or application logic has explored data within the storage account.
130+
58131

59-
* **Unusual data extraction**: This alert is triggered when there's a change in the data extraction pattern from a storage account. For instance, if someone has accessed an unusual amount of data in a storage account. In some cases, the alert detects a legitimate action (maintenance activity). In other cases, the alert detects a malicious action (data exfiltration/breach, unauthorized transfer of data).
60132

61-
* **Unusual anonymous access:** This alert is triggered when there's a change in the access pattern to a storage account. For instance, suppose someone has anonymously accessed a storage account. In some cases, the alert detects a legitimate access using public read access. In other cases, the alert detects unauthorized access that exploits public read access to a container and its blobs.
62133

63-
* **Unexpected delete:** This alert is triggered when one or more unexpected delete operations occur in a storage account, based on historical analysis of the storage account. For instance, suppose someone performed a *DeleteBlob* operation using a new application and from a new IP address. In some cases, the alert detects a legitimate action (the administrator used a different browser while traveling on business). In other cases, the alert detects a malicious action (an attacker deleting data).
64-
65-
* **Access permission change:** This alert is triggered when there’s an unexpected change of access permission to a storage account. For instance, suppose someone changed the access permission to a storage account using a new application and from a new IP address. In some cases, the alert detects a legitimate action (the administrator used a different browser while traveling on business). In other cases, the alert detects a malicious action (e.g., an attacker increasing the privileges of an account they have gained access to).
66134

67-
* **Upload Azure Cloud Service package:** This alert is triggered when there is an unexpected upload of an Azure Cloud Service package (*.cspkg* file) to a storage account. For instance, suppose a *.cspkg* file was uploaded from a new IP address. In some case, the alert detects a legitimate action. In other cases, the alert detects a malicious action (e.g., a Cloud Service package was uploaded in preparation for a deployment of a malicious service).
68-
69135

70136
## Next steps
71137

articles/storage/queues/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@
5757
href: ../common/storage-service-encryption.md?toc=%2fazure%2fstorage%2fqueues%2ftoc.json
5858
- name: Encryption at rest with customer keys
5959
href: ../common/storage-service-encryption-customer-managed-keys.md?toc=%2fazure%2fstorage%2fqueues%2ftoc.json
60-
- name: Advanced Threat Protection (preview)
60+
- name: Advanced Threat Protection
6161
href: ../common/storage-advanced-threat-protection.md?toc=%2fazure%2fstorage%2fqueues%2ftoc.json
6262
- name: Enable secure TLS for Azure Storage client
6363
href: ../common/storage-security-tls.md?toc=%2fazure%2fstorage%2fqueues%2ftoc.json

0 commit comments

Comments
 (0)