To mitigate security risks associated with compromised keys and to enforce least privilege access and more granular access control through Microsoft Entra ID, disable Shared Key authorization for your Microsoft Azure Storage accounts. Once Shared Key authorization is disabled, Microsoft Azure will reject all subsequent requests to that account authorized with access keys. Only secure requests authorized with Microsoft Entra ID will succeed.
Preventing Shared Key authorization for Azure Storage accounts enhances security by reducing the risk of key leakage. Shared Keys grant full access to storage resources, making them a high-risk target. Instead, use Microsoft Entra ID authorization, which offers more granular, role-based access control (RBAC) and better auditing. Trend Cloud One™ – Conformity strongly recommends Microsoft Entra ID for its superior security compared to Shared Key authorization. To follow security best practices and ensure compliance, disable Shared Key authorization on your Azure Storage accounts, requiring all clients to use Microsoft Entra ID.
Audit
To determine if Shared Key authorization is disabled for your Azure Storage accounts, perform the following operations:
Remediation / Resolution
To disable Shared Key authorization for your Microsoft Azure Storage accounts, perform the following operations:
References
- Azure Official Documentation
- Authorize with Shared Key
- Prevent Shared Key authorization for an Azure Storage account
- Security Control v3: Network security
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az storage account list
- az storage account show
- az storage account update