Skip to content

Commit 9f297c8

Browse files
Merge pull request #2737 from ElazarK/CMG-exception
shared key exception
2 parents 99ccacf + bb7b7df commit 9f297c8

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article lists all Microsoft Defender for Cloud data security r
44
author: Elazark
55
ms.service: defender-for-cloud
66
ms.topic: reference
7-
ms.date: 03/29/2026
7+
ms.date: 04/15/2026
88
ms.author: elkrieger
99
ms.custom: generated
1010
ai-usage: ai-assisted
@@ -623,6 +623,9 @@ Configure a private endpoint connection to enable access to traffic coming only
623623
**Description**: Audit requirement of Microsoft Entra ID (Microsoft Entra ID) to authorize requests for your storage account. By default, requests can be authorized with either Microsoft Entra ID credentials, or by using the account access key for Shared Key authorization. Of these two types of authorization, Microsoft Entra ID provides superior security and ease of use over shared Key, and is recommended by Microsoft.
624624
(Related policy: [policy](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54))
625625

626+
> [!NOTE]
627+
> Some Azure services still require Shared Key access to function. For example, Microsoft Configuration Manager (SCCM) Cloud Management Gateway (CMG) uses Shared Key-based authorization for its underlying storage accounts. Disabling Shared Key access on storage accounts used by CMG breaks CMG functionality. If you use CMG or other services that depend on Shared Key access, [exempt those storage accounts](exempt-resource.md) from this recommendation rather than applying the remediation. Keep the related Azure Policy in **Audit** mode instead of **Deny** for these accounts, and document the business justification for the exception.
628+
626629
**Severity**: Medium
627630

628631
### Storage accounts should restrict network access using virtual network rules

0 commit comments

Comments
 (0)