Sensitive data threat detection#
Security · Storage Account · Rule · Preview · 2023_06 · Critical
Enable sensitive data threat detection in Microsoft Defender for Storage.
Description#
Sensitive data threat detection is an additional security feature for Microsoft Defender for Storage. When enabled Defender for Storage provides alerts when sensitive data is discovered.
The sensitive data threat detection capability helps teams:
- Identity where sensitive data is stored.
- Detect possible security incidents resulting is data exposure.
When enabling sensitive data threat detection, the sensitive data categories include built-in sensitive information types (SITs) in the default list of Microsoft Purview. It is possible to customize the Data Sensitivity Discovery for a organization, by creating custom sensitive information types (SITs).
Sensitive data threat detection in Microsoft Defender for Storage can be enabled at the subscription level and by doing so ensures all storage accounts in the subscription will be protected, including future ones.
When overriding sensitive data threat detection on individual Storage Account it is possible to configure custom sensitive data threat detection settings that differ from the settings configured at the subscription level.
Recommendation#
Consider enabling sensitive data threat detection using Microsoft Defender for Storage on the Storage Account. Additionally, consider enabling sensitive data threat detection for all Storage Accounts within a subscription.
Examples#
Configure with Azure template#
To deploy Storage Accounts that pass this rule:
- Deploy a
Microsoft.Security/DefenderForStorageSettings
sub-resource (extension resource). - Set the
properties.sensitiveDataDiscovery.isEnabled
property totrue
.
For example:
{
"type": "Microsoft.Security/defenderForStorageSettings",
"apiVersion": "2022-12-01-preview",
"scope": "[format('Microsoft.Storage/storageAccounts/{0}', parameters('name'))]",
"name": "current",
"properties": {
"isEnabled": true,
"malwareScanning": {
"onUpload": {
"isEnabled": true,
"capGBPerMonth": 5000
}
},
"sensitiveDataDiscovery": {
"isEnabled": true
},
"overrideSubscriptionLevelSettings": false
},
"dependsOn": [
"[resourceId('Microsoft.Storage/storageAccounts', parameters('name'))]"
]
}
Configure with Bicep#
To deploy Storage Accounts that pass this rule:
- Deploy a
Microsoft.Security/DefenderForStorageSettings
sub-resource (extension resource). - Set the
properties.sensitiveDataDiscovery.isEnabled
property totrue
.
For example:
resource defenderForStorageSettings 'Microsoft.Security/defenderForStorageSettings@2022-12-01-preview' = {
name: 'current'
scope: storageAccount
properties: {
isEnabled: true
malwareScanning: {
onUpload: {
isEnabled: true
capGBPerMonth: 5000
}
}
sensitiveDataDiscovery: {
isEnabled: true
}
overrideSubscriptionLevelSettings: false
}
}
Notes#
This feature is currently in preview.
The following limitations currently apply for Microsoft Defender for Storage:
- Only Storage Accounts with public network access set to enabled are supported.
- Not all storage services within Storage Accounts are currently supported.
- When Microsoft Defender is enabled at subscription and resource level, the subscription configuration will take priority.
To override settings on a Storage Account, set the
properties.overrideSubscriptionLevelSettings
property totrue
. - If there is no plan at the subscription level, Microsoft Defender for Storage can be configured without an override.
Links#
- SE:10 Monitoring and threat detection
- What is Microsoft Defender for Cloud?
- Sensitive data threat detection in Defender for Storage
- Support and prerequisites for data-aware security posture
- Overview of Microsoft Defender for Storage
- Enable and configure Microsoft Defender for Storage
- Quickstart: Enable enhanced security features
- Azure security baseline for Storage
- DP-2: Monitor anomalies and threats targeting sensitive data
- LT-1: Enable threat detection capabilities
- Azure Policy built-in policy definitions