Ensure that storage account access keys are periodically regenerated to maintain security and prevent unauthorized access resulting from key compromise.
excellence
Cryptographic key rotation is essential for maintaining the security of your storage accounts. When access keys remain static for extended periods, the risk of compromise increases significantly. Rotating keys periodically ensures that even if a key is inadvertently exposed through logs, configuration files, or other means, the exposure window is limited. Cryptographic key rotation periods will vary depending on your organization's security requirements and the type of data which is being stored in the Storage Account. For the purposes of this security recommendation, 90 days is prescribed as the default rotation period. Review and adjustment of the 90 day period is recommended based on your organization's security requirements, compliance obligations, and risk tolerance.
Failure to properly coordinate key rotation can result in service interruptions and application failures.
Audit
To determine if storage account access keys are periodically regenerated, perform the following operations:
Audit
Azure provides a built-in policy to detect expired storage account keys:
Remediation / Resolution
To regenerate storage account access keys, perform the following operations:
References
- Azure Official Documentation
- Manage storage account access keys
- PA-1: Separate and limit highly privileged/administrative users
- IM-2: Protect identity and authentication systems
- GS-6: Define and implement identity and privileged access strategy
- Azure Command Line Interface (CLI) Documentation
- az storage account keys renew
- az storage account list
- az monitor activity-log list