Skip to content
This repository has been archived by the owner on Aug 1, 2024. It is now read-only.

Questions regarding Infrastructure encryption #1079

Open
asgoe opened this issue Dec 28, 2022 · 0 comments
Open

Questions regarding Infrastructure encryption #1079

asgoe opened this issue Dec 28, 2022 · 0 comments

Comments

@asgoe
Copy link

asgoe commented Dec 28, 2022

Which service(blob, file, queue, table) does this issue concern?

Blob

Which version of the SDK was used?

12.13.1

Which platform are you using? (ex: .NET Core 2.1)

.NET Core 3.0

What problem was encountered?

I am from the Intune team under Management and Security. During our security review few questions came up regarding the encryption provided by Azure storage. The link below mentions
"Azure Storage automatically encrypts all data in a storage account at the service level using 256-bit AES encryption, one of the strongest block ciphers available, and is FIPS 140-2 compliant. Customers who require higher levels of assurance that their data is secure can also enable 256-bit AES encryption at the Azure Storage infrastructure level for double encryption.

To enable infrastructure encryption for a storage account, you must configure a storage account to use infrastructure encryption at the time that you create the account. Infrastructure encryption cannot be enabled or disabled after the account has been created. The storage account must be of type general-purpose v2 or premium block blob."

[Question] In the above, can you provide more information on the below questions?

  • Are these two instances of the same algorithm (at service layer and infrastructure layer) OR are they two different algorithms?
  • If there is some kind of security breach, are the two keys kept in the separate locations?
  • If the account keys are compromised, would infrastructure encryption be able to provide any protection?
  • In what kind of scenarios does the additional encryption help and protect the customer data? It is not clear from the article where this will be helpful.

https://learn.microsoft.com/en-us/azure/storage/common/infrastructure-encryption-enable?tabs=portal

How can we reproduce the problem in the simplest way?

No problem to re-produce

Have you found a mitigation/solution?

N/A

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant