Loading...

Enhancing Data Security and Digital Trust in the Cloud using Azure Services.

Enhancing Data Security and Digital Trust in the Cloud using Azure Services.

sasina_1-1725321078051.png

 

Introduction

Think of Client-Side Encryption (CSE) as a strategy that has proven to be most effective in augmenting data security and modern precursor to traditional approaches. In addition to providing a stronger security posture, this strategy is also in compliance with major data regulations like GDPR, FERPA and PCI-DSS. In this article, we’ll explore how CSE can provide superior protection for your data, particularly if an authentication and authorization account is compromised. We’ll also address common questions about Microsoft's stance on CSE and explain why CSE might not be as widely discussed as Client-Side Key Encryption (CSKE). By understanding these concepts, you can better meet security and regulatory requirements and ensure that your data remains protected.

 

Use Case

As shown below in the Figure 1: An example of Use Case Architecture. Protecting and managing financial and health sensitive data for clients is subject to stringent regulatory requirements such as GDPR and PCI-DSS and also the followings:

  • E-commerce: Protecting customer data such as credit card information, personal details, and purchase history is crucial to maintaining trust and complying with regulations like GDPR and PCI-DSS.
  • Technology and Software Development: Intellectual property, source code, and proprietary algorithms are valuable assets that need protection from unauthorized access and industrial espionage.  
  • Education: Institutions handle a significant amount of sensitive data, including student records, research data, and personal information of faculty and staff. Compliance with regulations like FERPA (Family Educational Rights and Privacy Act) is essential to protect the privacy of student information.

Practical Use Case scenario for CSE

  • Organizations handling highly sensitive information (e.g., sensitive personal information) can use CSE to ensure that data remains protected at all times, even if the cloud infrastructure is compromised.
  • Where and when clients need to comply with regulations that requiring strict control over the encryption keys and data access, CSE allows them to manage keys externally, ensuring no unauthorized access by cloud providers.
  • Organizations concerned about data governance, sovereignty and privacy can use CSE to ensure that their data is protected in line with local laws and privacy regulations.

Figure 1: An example of Use Case ArchitectureFigure 1: An example of Use Case Architecture

Understanding the concept

As it shown in the Figure 2: The Concept, the processes involved in client-side encryption (CSE) are the followings:

  • The client device or application utilizes the authentications and authorization components, authenticates with Azure Key Vault to securely retrieve the encryption key.
  • The client application uses the retrieved encryption key to encrypt the data, ensuring it is securely transformed into an encrypted format.
  • The client uploads the encrypted data to Azure Storage, where it is stored securely in its encrypted form.
  • When needed, the client retrieves the encrypted data from Azure Storage.
  • The client retrieves the encryption key again from Azure Key Vault.
  • It then decrypts the data, making it usable.

 

Figure 2: The ConceptFigure 2: The Concept

 

In a nutshell:

  • The company uses strong encryption algorithms AES-256 to encrypt data on the client side before uploading it to Azure Blob Storage.
  • Encryption keys are stored securely using a hardware security module (HSM), ensuring that keys are never exposed to the cloud service provider.
  • Encrypted data is uploaded to Azure, and only authorized client-side applications can decrypt and access the data using the securely managed keys.
  • NOTE: This does not jeopardize service-side encryption features for ease of use in protecting your data and if you are using client-side encryption, migrate your applications to version 2 for improved security.

 

Understanding Client-Side Encryption (CSE) and Client-Side Key Encryption (CSKE).

Client-Side Encryption (CSE) provides a significant security advantage by allowing organizations to maintain complete control over their data and encryption keys. This method not only enhances data security but also supports compliance with regulatory requirements, offering peace of mind in the ever-evolving landscape of cloud computing. CSE encrypts data before it is sent to any service like Azure and this means that the data is encrypted on the client’s side, and Azure never sees the encryption keys. Even if someone gains access to your Azure account, they cannot read your data without the keys. In contrast, Client-Side Key Encryption (CSKE) focuses on securing the encryption keys themselves. The client manages and controls these keys, ensuring they are not accessible to the cloud service. This adds an extra layer of protection by keeping the keys out of the service provider’s reach. Both approaches enhance security but address different aspects of data protection.

 

Why We Need Client-Side Encryption (CSE)

Enhanced Security

  • With CSE, data is encrypted before it leaves the client’s environment. This means that even if the cloud service is compromised, the attacker only has access to encrypted data, which is useless without the decryption keys.
  • There is no risk of them being exposed through cloud service vulnerabilities.

Regulatory Compliance

  • Under regulations like GDPR, data breaches involving encrypted data where the keys are not compromised may not require reporting. CSE ensures that the data is encrypted in a way that meets these regulatory requirements.
  • For industries with strict data protection requirements (e.g., healthcare, finance), CSE provides a way to handle sensitive data securely and meet compliance standards.

Data Ownership and Control

  • The client maintains full control over the encryption keys. This autonomy helps organizations enforce their own security policies and procedures.
  • Clients can ensure that their data sovereignty requirements are met since they control where and how the encryption keys are stored and managed.

 

Why Not Client-Side Key Encryption (CSKE) Alone

Reliance on Cloud Service

  • Even though CSKE allows clients to manage the encryption keys, the cloud service still handles the encryption and decryption operations. If the cloud service is compromised, there’s a risk that the data could be decrypted by the attacker using the stolen keys.
  • CSKE requires trusting that the cloud service’s encryption processes are secure and that there are no vulnerabilities that could be exploited to access the data.

 

Key Exposure Risks

  • With CSKE, there’s a shared responsibility between the client and the cloud service for data protection. Any lapses on the cloud service side could lead to key exposure.
  • While clients manage the keys, they must still rely on the cloud service to handle the actual encryption and decryption processes securely.

 

Azure's Position on CSE

Most of Azure’s documentation and services tend to emphasize Server-Side Encryption (SSE) due to its simplicity and ease of use for most scenarios. SSE allows Azure to provide a straightforward security model that works out-of-the-box for users, without requiring significant changes to their applications or processes.

However, Azure does support CSE through various SDKs and client libraries. For instance, Azure Storage SDKs for different programming languages provide support for encrypting data on the client side before uploading it to Azure Blob Storage.

 

Step-by-Step Solution for Implementing Client-Side Encryption (CSE) for Python, .NET Core Blazor App using C#, and Java Apps.

 

Requirements (Refers to Figure 1: An example of Use Case Architecture) 

Cloud provider (Microsoft Azure)

  • Choose the Right Azure Storage
  • Select the Encryption Mode
  • Ensure Right Dependencies
  • Azure Key Vault Integration
  • Azure Blob Storage (In this context)

 

Your organization responsibility to implement CSE

  • Determine the level of security needed for your data.
  • Identify any regulations (like GDPR) that mandate specific encryption practices.
  • Choose a strong encryption algorithm (AES-256) latest version and a reliable encryption library in your programming language of choice. For example, Python’s cryptography library, Java’s javax.crypto  or C# security.cryptography.algorithms package.
  • Azure subscription, storage account, and .NET SDK.

 

To implement Client-Side Encryption (CSE) in your application using Azure Key Vault and Azure Blob Storage.

 

Azure Key Vault

You will set up Azure Key Vault to store and manage encryption keys securely.

 

  1. You will need to create a Key Vault as this will help to create RSA, EC, or AES keys in Managed HSM, then use them for encryption-at-rest in Azure Storage, Azure SQL, and more. So, in the Azure portal, create a new Key Vault resource as shown below.
 

Figure 3: Creating Azure Key VaultFigure 3: Creating Azure Key Vault

 You will Navigate to Administrators by click on it, then Click Add principal, then select your apps as seen on the screen below:

Figure 4: Add Administrator for Azure Key Vault Managed HSMFigure 4: Add Administrator for Azure Key Vault Managed HSM

 

 

This will Set the permissions for the Key Vault, ensuring that your application can access the keys. So, review to create and Click on Create button as shown below:

Figure 5: Review and create Azure Key VaultFigure 5: Review and create Azure Key Vault

 

It might take a couple of minutes for your Azure Key Vault creation to deploy successfully.

 

Figure 6: Azure Key Vault deployment is completeFigure 6: Azure Key Vault deployment is complete

 

 

 

  1. Create or Import Encryption Keys:

Next is to create a new key or import an existing key in the Key Vault. This key will be used for encrypting and decrypting data. But prior to this you must have updated your network settings. So, let’s use Azure CLI:

  • To Create a New Key using bash in Azure CLI
az keyvault key create --vault-name <YourKeyVaultName> --name <YourKeyName> --protection software
  • To Import an Existing Key (If you have a key in a PEM or PFX file, you can import it) using bash in Azure CLI.
az keyvault key import --vault-name <YourKeyVaultName> --name <YourKeyName> --pem-file <YourPemFilePath>

 

Replace <YourKeyVaultName>, <YourKeyName>, and <YourPemFilePath> with your Key Vault name, the key name, and the path to your key file.

 

 

  1. Assign Access Policies to allow your app to perform operations like `wrapKey` and `unwrapKey` with the key using bash in Azure CLI:
az keyvault set-policy --name <YourKeyVaultName> --spn <YourAppServicePrincipalId> --key-permissions get list wrapKey unwrapKey

Replace <YourKeyVaultName> with your Key Vault name and <YourAppServicePrincipalId> with the service principal ID of your Blazor app.

 

Azure Blob Storage

You will configure Azure Blob Storage to store the encrypted data. You will be using Azure Storage client libraries for Blob Storage or Queue Storage if that’s your choice with the same steps.

 

  1. In the Azure portal, create a new Blob Storage account (Quickstart blobs)  or using Azure CLI as shown below:
az storage account create --name <YourStorageAccountName> --resource-group <YourResourceGroup> --location <YourLocation> --sku Standard_LRS --kind StorageV2

Replace <YourStorageAccountName>, <YourResourceGroup>, and <YourLocation> with your desired storage account name, resource group, and Azure region.

 

  1. Configure access control for your Blob Storage account, ensuring your app can read and write data using a service principal, for example you can assign a role like Storage Blob Data Contributor:
az role assignment create --assignee <YourAppServicePrincipalId> --role "Storage Blob Data Contributor" --scope /subscriptions/<YourSubscriptionId>/resourceGroups/<YourResourceGroup>/providers/Microsoft.Storage/storageAccounts/<YourStorageAccountName>

Replace <YourAppServicePrincipalId>, <YourSubscriptionId>, <YourResourceGroup>, and <YourStorageAccountName> with your service principal ID, subscription ID, resource group, and storage account name.

 

  1. Use SAS tokens or managed identities to secure access to the Blob Storage account. To generate a SAS token for the storage account using Azure CLI:
az storage account generate-sas --account-name <YourStorageAccountName> --permissions rwl --expiry <YYYY-MM-DD> --resource-types sco --services b --https-only

If your app is using a managed identity, the role assignment from previous step, it will automatically secure the storage account access, and no additional steps are required.

Replace <YourStorageAccountName> and <YYYY-MM-DD> with your storage account name and desired expiry date.

 

Implementing Client-Side Encryption for Python App

 

Encryption and Uploading in Python:

 

  1. Install the required libraries in bash command

  

pip install cryptography azure-storage-blob

 

  1. Encryption and Uploading in Python, for example:

  

from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes from azure.storage.blob import BlobServiceClient, BlobClient, ContainerClient import os from base64 import urlsafe_b64encode # Configuration account_url = "https://<your_storage_account>.blob.core.windows.net" container_name = "my-container" blob_name = "my-encrypted-blob" key = b'secret_key' # Replace with your secret key # Function to encrypt data def encrypt_data(data, key): backend = default_backend() salt = os.urandom(16) kdf = PBKDF2HMAC( algorithm=hashes.SHA256(), length=32, salt=salt, iterations=100000, backend=backend ) key = kdf.derive(key) iv = os.urandom(16) cipher = Cipher(algorithms.AES(key), modes.CFB(iv), backend=backend) encryptor = cipher.encryptor() encrypted_data = encryptor.update(data) + encryptor.finalize() return salt + iv + encrypted_data # Sample data to encrypt data = b"Sensitive data that needs encryption" # Encrypt the data encrypted_data = encrypt_data(data, key) # Upload encrypted data to Azure Blob Storage blob_service_client = BlobServiceClient(account_url=account_url) blob_client = blob_service_client.get_blob_client(container=container_name, blob=blob_name) blob_client.upload_blob(encrypted_data, overwrite=True) print("Data encrypted and uploaded successfully.")

Downloading and Decrypting in Python:

Decrypt and Download Data for example:

  

from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes from azure.storage.blob import BlobServiceClient, BlobClient, ContainerClient import os # Configuration account_url = "https://<your_storage_account>.blob.core.windows.net" container_name = "my-container" blob_name = "my-encrypted-blob" key = b'secret_key' # Replace with your secret key # Function to decrypt data def decrypt_data(encrypted_data, key): backend = default_backend() salt = encrypted_data[:16] iv = encrypted_data[16:32] ciphertext = encrypted_data[32:] kdf = PBKDF2HMAC( algorithm=hashes.SHA256(), length=32, salt=salt, iterations=100000, backend=backend ) key = kdf.derive(key) cipher = Cipher(algorithms.AES(key), modes.CFB(iv), backend=backend) decryptor = cipher.decryptor() decrypted_data = decryptor.update(ciphertext) + decryptor.finalize() return decrypted_data # Download encrypted data from Azure Blob Storage blob_service_client = BlobServiceClient(account_url=account_url) blob_client = blob_service_client.get_blob_client(container=container_name, blob=blob_name) encrypted_data = blob_client.download_blob().readall() # Decrypt the data decrypted_data = decrypt_data(encrypted_data, key) print(f"Decrypted data: {decrypted_data.decode('utf-8')}")

 

Implementing Client-Side Encryption for .NET Core Blazor App using C#

 

Encryption and uploading in C#:

 

 

  1. Irrespective of IDE you are using, Install the required NuGet packages:

  

dotnet add package Azure.Storage.Blobs dotnet add package System.Security.Cryptography.Algorithms

 

  1. Encryption and Uploading code example**:

 

```csharp using System; using System.IO; using System.Security.Cryptography; using Azure.Storage.Blobs; using Azure.Storage.Blobs.Models; // Configuration string accountUrl = "https://<your_storage_account>.blob.core.windows.net"; string containerName = "my-container"; string blobName = "my-encrypted-blob"; byte[] key = Convert.FromBase64String("your_base64_secret_key"); // Replace with your Base64 encoded secret key // Function to encrypt data byte[] EncryptData(byte[] data, byte[] key) { using var aes = Aes.Create(); aes.Key = key; aes.GenerateIV(); using var encryptor = aes.CreateEncryptor(aes.Key, aes.IV); using var ms = new MemoryStream(); ms.Write(aes.IV, 0, aes.IV.Length); using (var cs = new CryptoStream(ms, encryptor, CryptoStreamMode.Write)) { cs.Write(data, 0, data.Length); } return ms.ToArray(); } // Sample data to encrypt byte[] data = System.Text.Encoding.UTF8.GetBytes("Sensitive data that needs encryption"); // Encrypt the data byte[] encryptedData = EncryptData(data, key); // Upload encrypted data to Azure Blob Storage BlobServiceClient blobServiceClient = new BlobServiceClient(new Uri(accountUrl)); BlobContainerClient containerClient = blobServiceClient.GetBlobContainerClient(containerName); BlobClient blobClient = containerClient.GetBlobClient(blobName); using (var ms = new MemoryStream(encryptedData)) { blobClient.Upload(ms, new BlobHttpHeaders { ContentType = "application/octet-stream" }, true); } Console.WriteLine("Data encrypted and uploaded successfully.");

Downloading and Decrypting Example in C#:

Decrypt and Download Data:

using System; using System.IO; using System.Security.Cryptography; using Azure.Storage.Blobs; // Configuration string accountUrl = "https://<your_storage_account>.blob.core.windows.net"; string containerName = "my-container"; string blobName = "my-encrypted-blob"; byte[] key = Convert.FromBase64String("your_base64_secret_key"); // Replace with your Base64 encoded secret key // Function to decrypt data byte[] DecryptData(byte[] encryptedData, byte[] key) { using var aes = Aes.Create(); using var ms = new MemoryStream(encryptedData); byte[] iv = new byte[aes.BlockSize / 8]; ms.Read(iv, 0, iv.Length); using var decryptor = aes.CreateDecryptor(key, iv); using var cs = new CryptoStream(ms, decryptor, CryptoStreamMode.Read); using var result = new MemoryStream(); cs.CopyTo(result); return result.ToArray(); } // Download encrypted data from Azure Blob Storage BlobServiceClient blobServiceClient = new BlobServiceClient(new Uri(accountUrl)); BlobContainerClient containerClient = blobServiceClient.GetBlobContainerClient(containerName); BlobClient blobClient = containerClient.GetBlobClient(blobName); using var ms = new MemoryStream(); blobClient.DownloadTo(ms); byte[] encryptedData = ms.ToArray(); // Decrypt the data byte[] decryptedData = DecryptData(encryptedData, key); Console.WriteLine($"Decrypted data: {System.Text.Encoding.UTF8.GetString(decryptedData)}");

 

Replace <your_storage_account> and your_base64_secret_key with your actual storage account URL and Base64 encoded secret key, respectively.

 

Implementing Client-Side Encryption for Java application

 

Encryption and Uploading in Java:

 

  1. You will first need to add the required dependencies to your pom.xml:
<dependency> <groupId>com.azure</groupId> <artifactId>azure-storage-blob</artifactId> <version>12.16.0</version> </dependency> <dependency> <groupId>org.bouncycastle</groupId> <artifactId>bcprov-jdk15on</artifactId> <version>1.70</version> </dependency>

  

 

  1. Encryption and uploading similar code sample:
import com.azure.storage.blob.BlobClient; import com.azure.storage.blob.BlobContainerClient; import com.azure.storage.blob.BlobServiceClient; import com.azure.storage.blob.BlobServiceClientBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import javax.crypto.Cipher; import javax.crypto.KeyGenerator; import javax.crypto.SecretKey; import javax.crypto.spec.IvParameterSpec; import java.nio.file.Files; import java.nio.file.Path; import java.nio.file.Paths; import java.security.Security; import java.util.Base64; public class EncryptAndUpload { static { Security.addProvider(new BouncyCastleProvider()); } private static final String ACCOUNT_URL = "https://<your_storage_account>.blob.core.windows.net"; private static final String CONTAINER_NAME = "my-container"; private static final String BLOB_NAME = "my-encrypted-blob"; private static final String SECRET_KEY = "your_base64_secret_key"; // Replace with your Base64 encoded secret key public static void main(String[] args) throws Exception { // Sample data to encrypt byte[] data = "Sensitive data that needs encryption".getBytes(); // Encrypt the data byte[] encryptedData = encryptData(data); // Upload encrypted data to Azure Blob Storage BlobServiceClient blobServiceClient = new BlobServiceClientBuilder().endpoint(ACCOUNT_URL).buildClient(); BlobContainerClient containerClient = blobServiceClient.getBlobContainerClient(CONTAINER_NAME); BlobClient blobClient = containerClient.getBlobClient(BLOB_NAME); Path tempFile = Files.createTempFile("encrypted", ".dat"); Files.write(tempFile, encryptedData); blobClient.uploadFromFile(tempFile.toString(), true); System.out.println("Data encrypted and uploaded successfully."); } private static byte[] encryptData(byte[] data) throws Exception { SecretKey key = getKeyFromBase64(SECRET_KEY); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding", "BC"); byte[] iv = new byte[cipher.getBlockSize()]; new java.security.SecureRandom().nextBytes(iv); cipher.init(Cipher.ENCRYPT_MODE, key, new IvParameterSpec(iv)); byte[] encryptedData = cipher.doFinal(data); byte[] ivAndEncryptedData = new byte[iv.length + encryptedData.length]; System.arraycopy(iv, 0, ivAndEncryptedData, 0, iv.length); System.arraycopy(encryptedData, 0, ivAndEncryptedData, iv.length, encryptedData.length); return ivAndEncryptedData; } private static SecretKey getKeyFromBase64(String base64Key) { byte[] decodedKey = Base64.getDecoder().decode(base64Key); return new javax.crypto.spec.SecretKeySpec(decodedKey, 0, decodedKey.length, "AES"); } }

  

Downloading and Decrypting in Java

Decrypt and Download Data:

  

import com.azure.storage.blob.BlobClient; import com.azure.storage.blob.BlobContainerClient; import com.azure.storage.blob.BlobServiceClient; import com.azure.storage.blob.BlobServiceClientBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import javax.crypto.Cipher; import javax.crypto.SecretKey; import javax.crypto.spec.IvParameterSpec; import java.nio.file.Files; import java.nio.file.Path; import java.nio.file.Paths; import java.security.Security; import java.util.Base64; public class DownloadAndDecrypt { static { Security.addProvider(new BouncyCastleProvider()); } private static final String ACCOUNT_URL = "https://<your_storage_account>.blob.core.windows.net"; private static final String CONTAINER_NAME = "my-container"; private static final String BLOB_NAME = "my-encrypted-blob"; private static final String SECRET_KEY = "your_base64_secret_key"; // Replace with your Base64 encoded secret key public static void main(String[] args) throws Exception { // Download encrypted data from Azure Blob Storage BlobServiceClient blobServiceClient = new BlobServiceClientBuilder().endpoint(ACCOUNT_URL).buildClient(); BlobContainerClient containerClient = blobServiceClient.getBlobContainerClient(CONTAINER_NAME); BlobClient blobClient = containerClient.getBlobClient(BLOB_NAME); Path tempFile = Files.createTempFile("encrypted", ".dat"); blobClient.downloadToFile(tempFile.toString()); byte[] encryptedData = Files.readAllBytes(tempFile); // Decrypt the data byte[] decryptedData = decryptData(encryptedData); System.out.println("Decrypted data: " + new String(decryptedData)); } private static byte[] decryptData(byte[] encryptedData) throws Exception { SecretKey key = getKeyFromBase64(SECRET_KEY); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding", "BC"); byte[] iv = new byte[cipher.getBlockSize()]; System.arraycopy(encryptedData, 0, iv, 0, iv.length); byte[] encryptedContent = new byte[encryptedData.length - iv.length]; System.arraycopy(encryptedData, iv.length, encryptedContent, 0, encryptedContent.length); cipher.init(Cipher.DECRYPT_MODE, key, new IvParameterSpec(iv)); return cipher.doFinal(encryptedContent); } private static SecretKey getKeyFromBase64(String base64Key) { byte[] decodedKey = Base64.getDecoder().decode(base64Key); return new javax.crypto.spec.SecretKeySpec(decodedKey, 0, decodedKey.length, "AES"); } }

 

Likewise, you will replace <your_storage_account> and your_base64_secret_key with your actual storage account URL and Base64 encoded secret key, respectively and ensure you are using the latest Azure SDK.

 

Managing Encryption Keys

  • Store encryption keys securely, preferably in a hardware security module (HSM) or a key management service (KMS) and make sure you regularly rotate encryption keys to enhance security.

 

Verifying and Testing

  • Ensure that encryption and decryption processes are secure and cannot be bypassed.
  • Verify that your implementation meets all regulatory requirements.

 

Outcome

  • Even if the cloud storage is compromised, the encrypted data remains secure as the keys are not accessible to the attacker.
  • The company meets regulatory requirements by ensuring data is encrypted in a way that aligns with GDPR, PCI-DSS, and FERPA digital trust standards.
  • Full control over encryption keys and data access policies enhances the company’s ability to protect its clients' sensitive financial information.

 

Conclusion

We have seen so far, how Client-Side Encryption (CSE) provides an enhanced level of security by ensuring that data is encrypted before it leaves the client’s environment, and how we can implement this with three different programing languages for Azure App using Azure Key Vault, Azure Blob and create Azure Storage Account. This method aligns well with regulatory requirements such as GDPR, PCI-DSS, and FERPA, offering greater control over sensitive information and protecting it from breaches and unauthorized access. By implementing CSE, can better meet security and regulatory requirements, ensuring the highest level of data protection. It helps provides enhanced protection against data breaches. While it involves more complexity than Client-Side Key Encryption (CSKE), it offers significant security benefits that are crucial for handling sensitive data. CSE enhances security by allowing you to manage encryption keys independently. It's a valuable practice for safeguarding sensitive information in cloud solutions!

 

 

CAUTION:

  1. The code might need to upgrade depend on the time you are performing these tasks.
  2. If you are using Azure file share as a Persistent Volume Claim (PVC) in Azure Kubernetes Service (AKS) with POD workload identity to retrieve secret you will use the Secrets Store CSI Driver to natively retrieve secret contents from Azure Key Vault. This driver securely provides secrets to the requesting pods: https://learn.microsoft.com/en-us/azure/aks/developer-best-practices-pod-security

 

References

For more information on Azure's support for Client-Side Encryption and to access further resources on Azure's official documentation and security best practices.

 

 

Published on:

Learn more
Azure Developer Community Blog articles
Azure Developer Community Blog articles

Azure Developer Community Blog articles

Share post:

Related posts

Unified Routing – Diagnostics in Azure

You may (or may not) be aware that the diagnostics option in Unified Routing has been deprecated. It is being replaced by diagnostics in Azure...

5 hours ago

Service health and Message center: Azure Information Protection consolidation

This post is about the consolidation of Azure Information Protection communications under Microsoft Purview in Service Health and Message Cent...

7 hours ago

Switch to Azure Business Continuity Center for your at scale BCDR management needs

In response to the evolving customer requirements and environments since COVID-19, including the shift towards hybrid work models and the incr...

7 hours ago

Optimizing Azure Table Storage: Automated Data Cleanup using a PowerShell script with Azure Automate

Scenario This blog’s aim is to manage Table Storage data efficiently. Imagine you have a large Azure Table Storage that accumulates logs from ...

9 hours ago

Microsoft Fabric: Resolving Capacity Admin Permission Issues in Automate Capacity Scaling with Azure LogicApps

A while back, I published a blogpost explaining how to use Azure LogicApps to automate scaling Microsoft Fabric F capacities under the PAYG (P...

10 hours ago

The Azure Storage product group is heading to the SNIA Developer Conference 2024

The Azure Storage product group is heading to the SNIA Developer Conference (SDC) 2024 in Santa Clara, California, USA from September 16th thr...

1 day ago

ISSUE RESOLVED: Azure Lab Services - lab plan outage - September 12, 2024

Hello, Azure Lab Services is currently experiencing an outage affecting customers using Lab Plans for their service. Customers using Lab Accou...

3 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy