Skip to main content

Azure Storage Security Defaults are Changing! (August 2023 Edition)


MicoolPaul
Forum|alt.badge.img+23

Hello everyone,

Currently, if you create a new Azure Storage Account, public/anonymous access to the Azure Storage Account will be enabled by default.

Hopefully you knew this already, but if this is alarming, let’s read on.

 

When referring to this as public access, this means unauthorised/anonymous access, this has nothing to do with networking, it’s an authentication restriction.

 

Public Access is enabled by default at the storage account level. However, public access is disabled by default at the container level. In this situation, no public access to containers or their blobs is possible.

 

But this does raise the possibility of someone accidentally enabling public access on a container, setting it to Container or Blob, enabling anonymous public access to the data.

 

Microsoft intend to change this behaviour for new Storage Accounts created from August 2023 onwards. Instead, by disabling public access at a Storage Account level, it isn’t possible to configure public access at a Container level. This makes it a two-step process to enable public access now, preventing this from being an accidentally enabled setting.

 

Additionally, Microsoft’s Storage Accounts support object replication, whereby you can asynchronously replicate objects between Storage Accounts. One feature is the ability to replicate between different Azure Tenants. Currently, Microsoft enable cross-tenant replication by default on all Storage Accounts. However, from August, this will become a “default disabled” setting, requiring you to opt-in.

 

It’s nice to see Microsoft continuing to tighten up security, as not all security risks are created from malicious activity, but accidental oversight is a contributor to these scenarios too.

6 comments

Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 609 comments
  • May 18, 2023

wesmrt
Forum|alt.badge.img+4
  • Veeam MVP
  • 226 comments
  • May 18, 2023

It's definitely a good thing MS changing that, but I'm already imagining the case flow this wilm generate for us... :(


MicoolPaul
Forum|alt.badge.img+23
  • Author
  • 2361 comments
  • May 18, 2023

That’s certainly where I feel sorry for your public cloud & SaaS teams. If VMware break something in an update, it fails QA and you warn not to upgrade until it’s QA’d successfully. But if Microsoft want to change output content, goodbye compatibility and hello rush for fixes!


Chris.Childerhose
Forum|alt.badge.img+21

Interesting information about Azure, don’t use it much at the moment.  Thanks for sharing this, Michael.


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 609 comments
  • May 18, 2023

Azure SQL Database 2014-04-01 APIs will be retired on 31 October 2025

Azure SQL Database REST API 2014-04-01 Retirement Notice | Microsoft Learn


barellag
Forum|alt.badge.img
  • Comes here often
  • 19 comments
  • May 22, 2023
wesmrt wrote:

It's definitely a good thing MS changing that, but I'm already imagining the case flow this wilm generate for us... :(

At least this time, we are receiving the info in advance, not very usual :D