Ensure that the public (anonymous) access to blob containers is disabled at the Azure Storage account level in order to protect your data against unauthorized access. Disabling public access at the storage account level overrides the public access setting configured for the individual blob containers in that storage account.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
To follow security best practices and keep your blob data safe and secure in Azure cloud, ensure that your Azure Storage blob containers are not publicly exposed. Trend Cloud One™ – Conformity strongly recommends disabling anonymous access to all the blob containers provisioned within your Azure storage account, unless absolutely necessary.
Audit
To determine whether public access to blob containers is disabled at the storage account level, perform the following operations:
Remediation / Resolution
To disable public access to all the blob containers available within your Microsoft Azure Storage account, perform the following operations:
References
- Azure Official Documentation
- Remediate anonymous read access to blob data (Azure Resource Manager deployments)
- Configure anonymous read access for containers and blobs
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az storage account list
- az storage account show
- az storage account update