cloud security
8 TopicsStrengthening Azure File Sync security with Managed Identities
Hello Folks, As IT pros, we’re always looking for ways to reduce complexity and improve security in our infrastructure. One area that’s often overlooked is how our services authenticate with each other. Especially when it comes to Azure File Sync. In this post, I’ll walk you through how Managed Identities can simplify and secure your Azure File Sync deployments, based on my recent conversation with Grace Kim, Program Manager on the Azure Files and File Sync team. Why Managed Identities Matter Traditionally, Azure File Sync servers authenticate to the Storage Sync service using server certificates or shared access keys. While functional, these methods introduce operational overhead and potential security risks. Certificates expire, keys get misplaced, and rotating credentials can be a pain. Managed Identities solve this by allowing your server to authenticate securely without storing or managing credentials. Once enabled, the server uses its identity to access Azure resources, and permissions are managed through Azure Role-Based Access Control (RBAC). Using Azure File Sync with Managed Identities provides significant security enhancements and simpler credential management for enterprises. Instead of relying on storage account keys or SAS tokens, Azure File Sync authenticates using a system-assigned Managed Identity from Microsoft Entra ID (Azure AD). This keyless approach greatly improves security by removing long-lived secrets and reducing the attack surface. Access can be controlled via fine-grained Azure role-based access control (RBAC) rather than a broadly privileged key, enforcing least-privileged permissions on file shares. I believe that Azure AD RBAC is far more secure than managing storage account keys or SAS credentials. The result is a secure-by-default setup that minimizes the risk of credential leaks while streamlining authentication management. Managed Identities also improve integration with other Azure services and support enterprise-scale deployments. Because authentication is unified under Azure AD, Azure File Sync’s components (the Storage Sync Service and each registered server) seamlessly obtain tokens to access Azure Files and the sync service without any embedded secrets. This design fits into common Azure security frameworks and encourages consistent identity and access policies across services. In practice, the File Sync managed identity can be granted appropriate Azure roles to interact with related services (for example, allowing Azure Backup or Azure Monitor to access file share data) without sharing separate credentials. At scale, organizations benefit from easier administration. New servers can be onboarded by simply enabling a managed identity (on an Azure VM or an Azure Arc–connected server) and assigning the proper role, avoiding complex key management for each endpoint. Azure’s logging and monitoring tools also recognize these identities, so actions taken by Azure File Sync are transparently auditable in Azure AD activity logs and storage access logs. Given these advantages, new Azure File Sync deployments now enable Managed Identity by default, underscoring a shift toward identity-based security as the standard practice for enterprise file synchronization. This approach ensures that large, distributed file sync environments remain secure, manageable, and well-integrated with the rest of the Azure ecosystem. How It Works When you enable Managed Identity on your Azure VM or Arc-enabled server, Azure automatically provisions an identity for that server. This identity is then used by the Storage Sync service to authenticate and communicate securely. Here’s what happens under the hood: The server receives a system-assigned Managed Identity. Azure File Sync uses this identity to access the storage account. No certificates or access keys are required. Permissions are controlled via RBAC, allowing fine-grained access control. Enabling Managed Identity: Two Scenarios Azure VM If your server is an Azure VM: Go to the VM settings in the Azure portal. Enable System Assigned Managed Identity. Install Azure File Sync. Register the server with the Storage Sync service. Enable Managed Identity in the Storage Sync blade. Once enabled, Azure handles the identity provisioning and permissions setup in the background. Non-Azure VM (Arc-enabled) If your server is on-prem or in another cloud: First, make the server Arc-enabled. Enable System Assigned Managed Identity via Azure Arc. Follow the same steps as above to install and register Azure File Sync. This approach brings parity to hybrid environments, allowing you to use Managed Identities even outside Azure. Next Steps If you’re managing Azure File Sync in your environment, I highly recommend transitioning to Managed Identities. It’s a cleaner, more secure approach that aligns with modern identity practices. ✅ Resources 📚 https://learn.microsoft.com/azure/storage/files/storage-sync-files-planning 🔐 https://learn.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview ⚙️ https://learn.microsoft.com/azure/azure-arc/servers/overview 🎯 https://learn.microsoft.com/azure/role-based-access-control/overview 🛠️ Action Items Audit your current Azure File Sync deployments. Identify servers using certificates or access keys. Enable Managed Identity on eligible servers. Use RBAC to assign appropriate permissions. Let me know how your transition to Managed Identities goes. If you run into any snags or have questions, drop a comment. Cheers! Pierre193Views0likes0CommentsPartners can drive security ACR with the new Secure Multi-cloud Environments campaign assets
The increasingly complex state of cybersecurity is driving customer need for robust security solutions that achieve their hybrid and multi-cloud security objectives. Protecting their workloads against advanced threats, improving permissions and access management for their remote workforce, and enabling secure cloud app development are top of mind for businesses. Developed for Microsoft partners, the co-branded, customizable secure multi-cloud environments campaign-in-a-box (CiaB) is a robust collection of sales and marketing assets and resources geared toward accelerating your time to market, driving demand for security solutions, and moving qualified leads to the top of the funnel. Get started with the campaign execution guide located in the collection to launch your customized, multi-cloud security campaign. Featured in this CiaB collection is a partner hosted, Secure Multi-cloud Environments – Build Intent Workshop to run a threat and vulnerability analysis with your customers. The workshop provides the opportunity to deliver a comprehensive next-steps roadmap and execution plan to your customers. Additionally, the recently refreshed Secure Multi-cloud Environments 12-week digital campaign is available for you to run an automated campaign using the Digital Marketing Content OnDemand platform to engage your customers with impactful content. These resources are designed to help you address the growing business needs for securing multi-cloud and hybrid environments with your customers. Engage your customers with the new Secure Multi-cloud Environments partner-ready campaigns!546Views0likes0CommentsSäkerheten först: Hur du skyddar dig som Microsoft CSP leverantör
Hur skyddar du dig och dina kunder när du levererar Microsoft tjänster som CSP partner och hur väl rustad är du? Denna vecka träffar vi säkerhets CSA Oscar Kjellberg som pratar om den delade ansvarsmodellen för säkerhet, Microsoft secure score och andra verktyg som man kan aktivera för att skapa god säkerhet, och inte minst att man alltid ska slå på MFA! :studio_microphone: Moderator: Karl-Henrik Nilsson :studio_microphone: Gästtalare: Oscar Kjellberg Lyssna här!VPN är ett anti-pattern! - Season 3, Ep. 29
VPN är ett anti-pattern!? Dagens gäst är Jesper Kråkhede säkerhetsarkitekt på Microsoft som skickar en känga till att VPN och DMZ inte har med modern molnsäkerhet att göra! I dagens avsnitt går Jesper igenom flera av de metoder och produkter han anser att man bör använda för att bygga moderna och säkra lösningar 2023. :studio_microphone: Moderator: Karl-Henrik Nilsson :studio_microphone: Gästtalare: Jesper Kråkhede Lyssna på avsnittet här!Det kommer att ske en attack - Ett avsnitt om DDoS - Season 3, Ep. 33
Sverige möter en storm av överbelastningsattacker och för att förstå mer möter jag två av Microsoft kanske mest kompetenta och härliga människor i form av Microsoft nationella säkerhetschef Sandra Elvin och Magnus Haglund, ansvarig för Microsoft affärsområde säkerhet. Vi pratar om världsläget, olika former av kriminalitet inom IT, säkerhet i molnet, DDoS attacker och frågar oss hur många hackers det kan finns inom Vårbynätverket. Slutligen konstaterar vi att det kommer att ske en attack så in och lyssna innan du börjar rusta din miljö för framtiden! :studio_microphone: Moderator: Karl-Henrik Nilsson :studio_microphone: Gästtalare: Sandra Elvin och Magnus Haglund Lyssna nuHow to Secure an IoT Solution: A Beginner's Guide
IoT security is crucial to protect against unauthorized access to IoT systems. A zero-trust security model ensures basic identity, device, and access security practices. Divide security into device, connection, and cloud security. Include hardware manufacturer, solution developer, deployer, and operator in your IoT security strategy. Microsoft Defender for IoT can provide additional security monitoring and recommendations. Ensure minimum hardware requirements and secure hardware for device security. Consider implementing encryption for data protection. Incorporate threat modeling into the design phase for comprehensive security.3.1KViews0likes0CommentsAzure Sentinel Cybersecurity Maturity Model Certification (CMMC) Workbook
The Azure Sentinel CMMC Workbook provides a mechanism for viewing log queries aligned to CMMC controls across the Azure cloud including Microsoft security offerings, Office 365, Teams, Intune, Windows Virtual Desktop and many more. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective CMMC requirements and practices. The workbook features 250+ control cards aligned to the 17 CMMC control families across all 5 maturity levels with selectable GUI buttons for navigation.21KViews7likes3Comments
