You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Aug 1, 2024. It is now read-only.
Which service(blob, file, queue, table) does this issue concern?
Blob
Which version of the SDK was used?
12.13.1
Which platform are you using? (ex: .NET Core 2.1)
.NET Core 3.0
What problem was encountered?
I am from the Intune team under Management and Security. During our security review few questions came up regarding the encryption provided by Azure storage. The link below mentions
"Azure Storage automatically encrypts all data in a storage account at the service level using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. Customers who require higher levels of assurance that their data is secure can also enable 256-bit AES encryption at the Azure Storage infrastructure level for double encryption.
To enable infrastructure encryption for a storage account, you must configure a storage account to use infrastructure encryption at the time that you create the account. Infrastructure encryption cannot be enabled or disabled after the account has been created. The storage account must be of type general-purpose v2 or premium block blob."
[Question] In the above, can you provide more information on the below questions?
Are these two instances of the same algorithm (at service layer and infrastructure layer) OR are they two different algorithms?
If there is some kind of security breach, are the two keys kept in the separate locations?
If the account keys are compromised, would infrastructure encryption be able to provide any protection?
In what kind of scenarios does the additional encryption help and protect the customer data? It is not clear from the article where this will be helpful.
Which service(blob, file, queue, table) does this issue concern?
Blob
Which version of the SDK was used?
12.13.1
Which platform are you using? (ex: .NET Core 2.1)
.NET Core 3.0
What problem was encountered?
I am from the Intune team under Management and Security. During our security review few questions came up regarding the encryption provided by Azure storage. The link below mentions
"Azure Storage automatically encrypts all data in a storage account at the service level using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. Customers who require higher levels of assurance that their data is secure can also enable 256-bit AES encryption at the Azure Storage infrastructure level for double encryption.
To enable infrastructure encryption for a storage account, you must configure a storage account to use infrastructure encryption at the time that you create the account. Infrastructure encryption cannot be enabled or disabled after the account has been created. The storage account must be of type general-purpose v2 or premium block blob."
[Question] In the above, can you provide more information on the below questions?
https://learn.microsoft.com/en-us/azure/storage/common/infrastructure-encryption-enable?tabs=portal
How can we reproduce the problem in the simplest way?
No problem to re-produce
Have you found a mitigation/solution?
N/A
The text was updated successfully, but these errors were encountered: