Ensure that Microsoft Entra authorization in the Azure portal is enabled by default for your Microsoft Azure Storage accounts. This promotes a more secure, identity-based access control compared to shared keys or SAS tokens, aligning with best practices for least privilege and compliance.
For enhanced security, Microsoft Entra authorization is recommended over Shared Key authorization. Microsoft Entra ID provides robust, role-based access control (RBAC) and comprehensive auditing capabilities. Upon enablement, the Azure portal defaults to Microsoft Entra ID for authorizing requests to blobs, files, queues, and tables, effectively enforcing least privilege and granular access management.
Audit
To determine if Microsoft Entra authorization in the Azure portal is enabled by default for your Storage accounts, perform the following operations:
Remediation / Resolution
To disable public network access to your Azure virtual machine (VM) disks, perform the following operations:
References
- Azure Official Documentation
- Security Control v3: Network security
- Choose how to authorize access to blob data in the Azure portal
- Authorize access to blobs using Microsoft Entra ID
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az storage account list
- az storage account show
- az storage account update