Skip to content

Commit ae9f9e6

Browse files
Merge pull request #269437 from AbhishekMallick-MS/Mar-19-2024-Security
Security DAdata isolation details added
2 parents 967355d + e33cefa commit ae9f9e6

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/backup/security-overview.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview of security features
33
description: Learn about security capabilities in Azure Backup that help you protect your backup data and meet the security needs of your business.
44
ms.topic: conceptual
5-
ms.date: 02/29/2024
5+
ms.date: 03/19/2024
66
author: AbhishekMallick-MS
77
ms.author: v-abhmallick
88
---
@@ -25,9 +25,13 @@ Learn more about [Azure role-based access control to manage Azure Backup](./back
2525

2626
Azure Backup has several security controls built into the service to prevent, detect, and respond to security vulnerabilities. Learn more about [security controls for Azure Backup](./security-baseline.md).
2727

28-
## Separation between guest and Azure storage
28+
## DaData isolation with Azure Backup
2929

30-
With Azure Backup, which includes virtual machine backup and SQL and SAP HANA in VM backup, the backup data is stored in Azure storage and the guest has no direct access to backup storage or its contents. With the virtual machine backup, the backup snapshot creation and storage are done by Azure fabric where the guest has no involvement other than quiescing the workload for application consistent backups. With SQL and SAP HANA, the backup extension gets temporary access to write to specific blobs. In this way, even in a compromised environment, existing backups can't be tampered with or deleted by the guest.
30+
With Azure Backup, the vaulted backup data is stored in Microsoft-managed Azure subscription and tenant. External users or guests have no direct access to this backup storage or its contents, ensuring the isolation of backup data from the production environment where the data source resides.
31+
32+
In Azure, all communications and data in transit is securely transferred with *HTTPS* and *TLS 1.2+* protocols. This data remains on the Azure backbone network ensuring reliable and efficient data transmission. The backup data at rest is encrypted by default using *Microsoft-managed keys*. You can also bring your own keys for encryption if you require greater control over the data. To enhance protection, you can use [immutability](#immutable-vaults), which prevents data from being altered or deleted before its retention period. Azure Backup gives you diverse options such as [soft delete](#soft-delete), stop backup and delete data or retain data if you need to stop backups at any time. To protect critical operations, you can add [Multi-User Authorization (MUA)](#multi-user-authorization) that adds additional layer of protection by using an Azure resource called Azure Resource Guard (ARG).
33+
34+
This robust approach ensures that even in a compromised environment, existing backups cannot be tampered with or deleted by unauthorized users.
3135

3236
## Internet connectivity not required for Azure VM backup
3337

0 commit comments

Comments
 (0)