home.social

#storageaccount โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #storageaccount, aggregated by home.social.

  1. TIL disabling public access to a storage account does not disable all public access in certain scenarios:
    "By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any resource instances and exceptions that you previously configured, including Allow Azure services on the trusted services list to access this storage account, will remain in effect. As a result, those resources and services might still have access to the storage account."

    Reference: learn.microsoft.com/en-us/azur

    The settings for 'resource instances' and 'exceptions' can be seen in attached screenshot.

    Unfortunately, these settings are not visible any more once Public network access is set to disabled, which is why it is easy to miss this configuration. This azure resource graph query can help finding storage accounts that have public network access disabled but still allow Azure services and/or resource types:
    ```
    resources
    | where type =~ 'Microsoft.Storage/storageAccounts'
    | where properties.publicNetworkAccess =~ 'Disabled'
    | where (array_length(properties.networkAcls.resourceAccessRules) > 0
    or properties.networkAcls.bypass =~ 'AzureServices')
    ```
    #azure #storageaccount #resourcegraph

  2. ๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ข๐ง๐  ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐‚๐ฅ๐จ๐ฎ๐ ๐‹๐š๐›๐ฌ

    Our labs project help you get ramped up with Microsoft Defender for Cloud and provide hands-on practical experience for product features, capabilities, and scenarios. The labs are divided into 3 main tracks, a beginner (level 100/200) and an advanced (level 300+) track. The labs contain several modules cover different pillars such as Cloud Security Posture Management (CSPM) to Cloud Workload Protection (CWP). To start using our labs, you will need to create Azure Trial Subscription which provides you all capabilities for 30 days โ€“ so you have to finish this lab at this point to take advantage of the free trial.

    github.com/Azure/Microsoft-Def

    #defender #defenderforcloud #cnapp #cspm #cwp #cwpp #cloudsecurity #multicloud #azure #aws #gcp #microsoft #microsoftsecurity #soc #server #container #storage #dns #api #devops #database #api #github #arc #agentless #storageaccount #mde #vulnerability #mdvm #siem

  3. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฎ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—”๐—ฝ๐—ฝ?

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐š˜ฬฒ๐š™ฬฒ๐šŽฬฒ๐š›ฬฒ๐šŠฬฒ๐šฬฒ๐š’ฬฒ๐š˜ฬฒ๐š—ฬฒ

    โžก๏ธDefender for Cloud for assessment of potential configuration-related security vulnerabilities

    โžก๏ธLog and monitor: diagnostic settings to configure streaming export of platform logs and metrics

    โžก๏ธRequire HTTPS

    โžก๏ธSecuring keys with Azure key Vault

    โžก๏ธEnable App Service Authentication/Authorization

    โžก๏ธUse Azure API Management (APIM) to authenticate requests

    โžก๏ธRun your function app with the lowest possible permissions

    โžก๏ธStore data encrypted

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐šฬฒ๐šŽฬฒ๐š™ฬฒ๐š•ฬฒ๐š˜ฬฒ๐šขฬฒ๐š–ฬฒ๐šŽฬฒ๐š—ฬฒ๐šฬฒ

    โžก๏ธDisable FTP

    โžก๏ธSecure the scm endpoint

    ๐™ฝฬฒ๐šŽฬฒ๐šฬฒ๐š ฬฒ๐š˜ฬฒ๐š›ฬฒ๐š”ฬฒโ€‚ฬฒ๐šœฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐š’ฬฒ๐šฬฒ๐šขฬฒ

    โžก๏ธSet access restrictions

    โžก๏ธSecure the storage account

    โžก๏ธPrivate site access with Azure Private Endpoint

    โžก๏ธDeploy your function app in isolation configuring a Web Application Firewall (WAF) for App Service Environment.

    More details: learn.microsoft.com/en-us/azur

    #security #azure #cloud #data #management #streaming #functionapp #serverless #waf #appservice #privateendpoint #networksecurity #securedeployment #apim #ftp #keyvault #key #vulnerability #assessment #misconfiguration #encryption #storage #storageaccount #defender #defenderforcloud #cnapp #cspm #cwpp #microsoft #microsoftsecurity #cloudsecurity #cloudnative #siem #monitoring #soc

  4. ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฎ ๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—”๐—ฝ๐—ฝ?

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐š˜ฬฒ๐š™ฬฒ๐šŽฬฒ๐š›ฬฒ๐šŠฬฒ๐šฬฒ๐š’ฬฒ๐š˜ฬฒ๐š—ฬฒ

    โžก๏ธDefender for Cloud for assessment of potential configuration-related security vulnerabilities

    โžก๏ธLog and monitor: diagnostic settings to configure streaming export of platform logs and metrics

    โžก๏ธRequire HTTPS

    โžก๏ธSecuring keys with Azure key Vault

    โžก๏ธEnable App Service Authentication/Authorization

    โžก๏ธUse Azure API Management (APIM) to authenticate requests

    โžก๏ธRun your function app with the lowest possible permissions

    โžก๏ธStore data encrypted

    ๐š‚ฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐šŽฬฒโ€‚ฬฒ๐šฬฒ๐šŽฬฒ๐š™ฬฒ๐š•ฬฒ๐š˜ฬฒ๐šขฬฒ๐š–ฬฒ๐šŽฬฒ๐š—ฬฒ๐šฬฒ

    โžก๏ธDisable FTP

    โžก๏ธSecure the scm endpoint

    ๐™ฝฬฒ๐šŽฬฒ๐šฬฒ๐š ฬฒ๐š˜ฬฒ๐š›ฬฒ๐š”ฬฒโ€‚ฬฒ๐šœฬฒ๐šŽฬฒ๐šŒฬฒ๐šžฬฒ๐š›ฬฒ๐š’ฬฒ๐šฬฒ๐šขฬฒ

    โžก๏ธSet access restrictions

    โžก๏ธSecure the storage account

    โžก๏ธPrivate site access with Azure Private Endpoint

    โžก๏ธDeploy your function app in isolation configuring a Web Application Firewall (WAF) for App Service Environment.

    More details: learn.microsoft.com/en-us/azur

    #security #azure #cloud #data #management #streaming #functionapp #serverless #waf #appservice #privateendpoint #networksecurity #securedeployment #apim #ftp #keyvault #key #vulnerability #assessment #misconfiguration #encryption #storage #storageaccount #defender #defenderforcloud #cnapp #cspm #cwpp #microsoft #microsoftsecurity #cloudsecurity #cloudnative #siem #monitoring #soc

  5. So, here is a #PowerShell #ResourceGraph query to list all storage accounts and their #allowSharedKeyAccess settings:

    Search-AzGraph -Query "resources | where type =~ 'Microsoft.Storage/storageAccounts' | extend allowSharedKeyAccess = parse_json(properties).allowSharedKeyAccess | project subscriptionId, resourceGroup, name, allowSharedKeyAccess"

    #Azure #StorageAccount #SharedKeyAccess

    Ref: learn.microsoft.com/en-gb/azur