Description
The Azure Storage setting ‘Allow Blob Anonymous Access’ (aka "allowBlobPublicAccess") controls whether anonymous access is allowed for blob data in a storage account. When this property is set to True, it enables public read access to blob data, which can be convenient for sharing data but may carry security risks. When set to False, it disallows public access to blob data, providing a more secure storage environment.
Rationale
If "Allow Blob Anonymous Access" is enabled, blobs can be accessed by adding the blob name to the URL to see the contents. An attacker can enumerate a blob using methods, such as brute force, and access them.
Exfiltration of data by brute force enumeration of items from a storage account may occur if this setting is set to 'Enabled'.
Impact
Additional consideration may be required for exceptional circumstances where elements of a storage account require public accessibility. In these circumstances, it is highly recommended that all data stored in the public facing storage account be reviewed for sensitive or potentially compromising data, and that sensitive or compromising data is never stored in these storage accounts.
Audit
From Azure Portal
- Go to
Storage Accounts
. - For each storage account, under
Settings
, clickConfiguration
. - Ensure
Allow Blob Anonymous Access
is set toDisabled
.
Repeat these steps for each Storage Account.
From Azure CLI
For every storage account in scope:
az storage account show --name "<yourStorageAccountName>" --query allowBlobPublicAccess
Ensure that every storage account in scope returns false
for the allowBlobPublicAccess
setting.
From Azure Policy
If referencing a digital copy of this Benchmark, clicking a Policy ID will open a link to the associated Policy definition in Azure.
- Policy ID: 4fa4b6c0-31ca-4c0d-b10d-24b96f62a751 - Name:
[Preview]: Storage account public access should be disallowed
Default Value
By default, allowBlobPublicAccess
is Disabled
.
References
- https://learn.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent?tabs=portal
- https://learn.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent?source=recommendations&tabs=portal
- Classic Storage Accounts: https://learn.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent-classic?tabs=portal
Additional Information
Azure Storage accounts that use the classic deployment model will be retired on August 31, 2024.