You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/data-encryption-best-practices.md
+14-21Lines changed: 14 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,8 @@ This article describes best practices for data security and encryption.
17
17
18
18
The best practices are based on a consensus of opinion, and they work with current Azure platform capabilities and feature sets. Opinions and technologies change over time and this article is updated on a regular basis to reflect those changes.
19
19
20
+
This article aligns with Microsoft's [Zero Trust](/security/zero-trust/zero-trust-overview) security model, which treats data as one of the critical pillars requiring protection at all stages. For prescriptive security controls with Azure Policy enforcement, see [Microsoft Cloud Security Benchmark v2 - Data Protection](/security/benchmark/azure/mcsb-v2-data-protection).
21
+
20
22
## Protect data
21
23
To help protect data in the cloud, you need to account for the possible states in which your data can occur, and what controls are available for that state. Best practices for Azure data security and encryption relate to the following data states:
22
24
@@ -37,23 +39,19 @@ Azure offers several different services to protect your cryptographic keys using
37
39
38
40
Because the vast majority of attacks target the end user, the endpoint becomes one of the primary points of attack. An attacker who compromises the endpoint can use the user's credentials to gain access to the organization's data. Most endpoint attacks take advantage of the fact that users are administrators in their local workstations.
39
41
40
-
**Best practice**: Use a secure management workstation to protect sensitive accounts, tasks, and data.
41
-
**Detail**: Use a [privileged access workstation](https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model/) to reduce the attack surface in workstations. These secure management workstations can help you mitigate some of these attacks and ensure that your data is safer.
42
+
-**Use a secure management workstation to protect sensitive accounts, tasks, and data**: Use a [privileged access workstation](/security/privileged-access-workstations/overview) to reduce the attack surface in workstations. These secure management workstations can help you mitigate some of these attacks and ensure that your data is safer.
42
43
43
-
**Best practice**: Ensure endpoint protection.
44
-
**Detail**: Enforce security policies across all devices that are used to consume data, regardless of the data location (cloud or on-premises).
44
+
-**Ensure endpoint protection**: Enforce security policies across all devices that are used to consume data, regardless of the data location (cloud or on-premises).
45
45
46
46
## Protect data at rest
47
47
48
48
[Data encryption at rest](encryption-atrest.md) is a mandatory step toward data privacy, compliance, and data sovereignty.
49
49
50
-
**Best practice**: Apply encryption at host to help safeguard your data.
51
-
**Detail**: Use [Encryption at host - End-to-end encryption for your VM](/azure/virtual-machines/disk-encryption#encryption-at-host---end-to-end-encryption-for-your-vm-data). Encryption at host is a Virtual Machine option that enhances Azure Disk Storage Server-Side Encryption to ensure that all temp disks and disk caches are encrypted at rest and flow encrypted to the Storage clusters..
50
+
-**Apply encryption at host to help safeguard your data**: Use [Encryption at host - End-to-end encryption for your VM](/azure/virtual-machines/disk-encryption#encryption-at-host---end-to-end-encryption-for-your-vm-data). Encryption at host is a Virtual Machine option that enhances Azure Disk Storage Server-Side Encryption to ensure that all temp disks and disk caches are encrypted at rest and flow encrypted to the Storage clusters.
52
51
53
52
Most Azure services, such as Azure Storage and Azure SQL Database, encrypt data at rest by default. You can use Azure Key Vault to maintain control of keys that access and encrypt your data. See [Azure resource providers encryption model support to learn more](encryption-atrest.md#azure-resource-providers-encryption-model-support).
54
53
55
-
**Best practices**: Use encryption to help mitigate risks related to unauthorized data access.
56
-
**Detail**: Encrypt encryption on your services before you write sensitive data to them.
54
+
-**Use encryption to help mitigate risks related to unauthorized data access**: Encrypt your services before you write sensitive data to them.
57
55
58
56
Organizations that don't enforce data encryption are more exposed to data-confidentiality issues. Companies also must prove that they are diligent and using correct security controls to enhance their data security in order to comply with industry regulations.
59
57
@@ -65,17 +63,13 @@ For data moving between your on-premises infrastructure and Azure, consider appr
65
63
66
64
Following are best practices specific to using Azure VPN Gateway, SSL/TLS, and HTTPS.
67
65
68
-
**Best practice**: Secure access from multiple workstations located on-premises to an Azure virtual network.
69
-
**Detail**: Use [site-to-site VPN](../../vpn-gateway/tutorial-site-to-site-portal.md).
66
+
-**Secure access from multiple workstations located on-premises to an Azure virtual network**: Use [site-to-site VPN](../../vpn-gateway/tutorial-site-to-site-portal.md).
70
67
71
-
**Best practice**: Secure access from an individual workstation located on-premises to an Azure virtual network.
72
-
**Detail**: Use [point-to-site VPN](../../vpn-gateway/vpn-gateway-howto-point-to-site-classic-azure-portal.md).
68
+
-**Secure access from an individual workstation located on-premises to an Azure virtual network**: Use [point-to-site VPN](../../vpn-gateway/vpn-gateway-howto-point-to-site-classic-azure-portal.md).
73
69
74
-
**Best practice**: Move larger data sets over a dedicated high-speed WAN link.
75
-
**Detail**: Use [ExpressRoute](../../expressroute/expressroute-introduction.md). If you choose to use ExpressRoute, you can also encrypt the data at the application level by using SSL/TLS or other protocols for added protection.
70
+
-**Move larger data sets over a dedicated high-speed WAN link**: Use [ExpressRoute](../../expressroute/expressroute-introduction.md). If you choose to use ExpressRoute, you can also encrypt the data at the application level by using SSL/TLS or other protocols for added protection.
76
71
77
-
**Best practice**: Interact with Azure Storage through the Azure portal.
78
-
**Detail**: All transactions occur via HTTPS. You can also use [Storage REST API](/rest/api/storageservices/) over HTTPS to interact with [Azure Storage](../../storage/common/storage-introduction.md).
72
+
-**Interact with Azure Storage through the Azure portal**: All transactions occur via HTTPS. You can also use [Storage REST API](/rest/api/storageservices/) over HTTPS to interact with [Azure Storage](../../storage/common/storage-introduction.md).
79
73
80
74
Organizations that fail to protect data in transit are more susceptible to [man-in-the-middle attacks](/previous-versions/office/skype-server-2010/gg195821(v=ocs.14)), [eavesdropping](/previous-versions/office/skype-server-2010/gg195641(v=ocs.14)), and session hijacking. These attacks can be the first step in gaining access to confidential data.
81
75
@@ -119,8 +113,7 @@ Organizations that are weak on [data classification](https://download.microsoft.
119
113
120
114
## Next steps
121
115
122
-
See [Azure security best practices and patterns](best-practices-and-patterns.md) for more security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure.
123
-
124
-
The following resources are available to provide more general information about Azure security and related Microsoft services:
125
-
*[Azure Security Team Blog](/archive/blogs/azuresecurity/) - for up to date information on the latest in Azure Security
126
-
*[Microsoft Security Response Center](https://technet.microsoft.com/library/dn440717.aspx) - where Microsoft security vulnerabilities, including issues with Azure, can be reported or via email to [email protected]
116
+
- See [Azure security best practices and patterns](best-practices-and-patterns.md) for more security best practices to use when you're designing, deploying, and managing your cloud solutions by using Azure.
117
+
- Review the [Microsoft Cloud Security Benchmark v2 - Data Protection](/security/benchmark/azure/mcsb-v2-data-protection) controls for comprehensive data security guidance with Azure Policy mappings.
118
+
- Learn about the [Microsoft Secure Future Initiative (SFI)](/security/zero-trust/sfi/secure-future-initiative-overview), Microsoft's internal security best practices for protecting data that we also recommend to customers.
119
+
- Explore [Zero Trust deployment for data](/security/zero-trust/deploy/data) for guidance on implementing Zero Trust principles for data protection.
0 commit comments