Ensure Soft Delete is Enabled for Azure Storage

MEDIUM

Description

Description:

The Azure Storage blobs contain data like ePHI, Financial, secret or personal. Erroneously modified or deleted accidentally by an application or other storage account user cause data loss or data unavailability.

It is recommended the Azure Storage be made recoverable by enabling soft delete configuration. This is to save and recover data when blobs or blob snapshots are deleted.

Rationale:

There could be scenarios where users accidentally run delete commands on Azure Storage blobs or blob snapshot or attacker/malicious user does it deliberately to cause disruption. Deleting an Azure Storage blob leads to immediate data loss / non-accessible data.

There is a property of Azure Storage blob service to make recoverable blobs.

  • Soft Delete

Enabling this configuration for azure storage ensures that even if blobs/data were deleted from the storage account, Blobs/data objects remain recoverable for a particular time which set in the "Retention policies" [Retention policies can be 7 days to 365 days].

Remediation

From Azure Console:

  1. Go to Storage Account
  2. For each Storage Account, navigate to 'Data Protection'
  3. Select set soft delete enabled and enter a number of days you want to retain soft deleted data.

Using Azure Command-Line Interface 2.0:

Update retention days in below command

az storage blob service-properties delete-policy update --days-retained --account-name > --account-key --enable true
.

Policy Details

Rule Reference ID: AC_AZURE_0367
CSP: Azure
Remediation Available: Yes
Resource Category: Storage
Resource Type: Storage Accounts

Frameworks