Storage Account Security: AZ-500 Exam Guide
Storage Account security covers SAS tokens, the storage firewall, encryption at rest, and Defender for Storage. The AZ-500 tests all four areas: know the SAS types, what the firewall does and does not block, and how CMK differs from Microsoft-managed keys.
Shared Access Signatures (SAS)
A SAS token grants time-limited, scoped access to storage resources without sharing the account key.
| SAS Type | Scope | Revocation |
|---|---|---|
| Account SAS | Entire storage account | Delete/rotate account key |
| Service SAS | Specific service (Blob, Queue, etc.) | Delete/rotate account key |
| User Delegation SAS | Blob/Data Lake | Revoke the Entra user's key via API |
Storage Firewall
The storage firewall restricts access to specific VNets (via Service Endpoints) and IP ranges. Key behaviours:
- "Allow trusted Microsoft services" exception: Enables Azure services like Backup, Event Grid, and Azure Monitor to bypass the firewall even when all public access is restricted.
- Setting "Disable public network access" blocks everything including Service Endpoint traffic: only Private Endpoint traffic is allowed.
Encryption
All data in Azure Storage is encrypted at rest using AES-256 by default (Microsoft-managed keys). For regulatory requirements:
- Customer-Managed Keys (CMK): Your key in Key Vault encrypts the storage account's data encryption key. You control rotation and can revoke access.
- Customer-Provided Keys: You send an encryption key on each request: the key is not stored by Azure.
Defender for Storage
Defender for Storage detects: unusual access patterns, anonymous access to containers, hash reputation analysis for uploaded files, malware scanning (preview). Enable per storage account or per subscription.
Get weekly security insights
Cloud security, zero trust, and identity guides — straight to your inbox.
Microsoft Cloud Solution Architect
Cloud Solution Architect with deep expertise in Microsoft Azure and a strong background in systems and IT infrastructure. Passionate about cloud technologies, security best practices, and helping organizations modernize their infrastructure.
Questions & Answers
Related Articles
Need Help with Your Security?
Our team of security experts can help you implement the strategies discussed in this article.
Contact Us