Ensure that the monitoring of the Microsoft Azure Storage Accounts encrypted with customer-managed keys is enabled within the Microsoft Defender for Cloud security policy.
To secure your Azure Storage Accounts resources with greater flexibility and meet stringent compliance requirements you can use customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your Storage Accounts data. Using customer-managed keys provides additional capabilities to control the rotation of the encryption key or cryptographically erase data.
Audit
To determine if the monitoring of the Storage Accounts encrypted with customer-managed keys is enabled within the Microsoft Defender for Cloud security policy, perform the following actions:
Remediation / Resolution
To enable the monitoring of the Microsoft Azure Storage Accounts encrypted with customer-managed keys, perform the following actions:
References
- Azure Official Documentation
- Microsoft Defender for Cloud documentation
- What is Microsoft Defender for Cloud?
- Azure Policy built-in policy definitions
- Manage security policies
- Azure Storage encryption for data at rest
- Azure Command Line Interface (CLI) Documentation
- az
- az account get-access-token