Files
Azure Files is an Azure file storage service based on the SMB protocol.
Network access
Azure Files is a managed service, and located outside the customer’s VNet. Protect access to the Azure Files service.
Best practices
Since SMB is considered a non-secure protocol, make sure all access to Azure Files services from the on-premises network pass through a secured channel such as a VPN tunnel or an ExpressRoute service.
To secure access from your VNet to Azure Files, use an Azure private endpoint, which avoids sending network traffic outside your VNet, through a secure channel.
Remove the need for the use of transport encryption (HTTPS only) for all Azure Files shares.
For sensitive environments, require a minimum TLS version of 1.2 for Azure Blob storage.
Deny default network access to the Azure storage account and only allow access from a predefined set of IP addresses.
For data that you need to retain for long periods (due to regulatory requirements), enable the Azure Files soft delete feature to protect the data from accidental deletion.
Encrypt data at rest using Azure Key Vault.
For sensitive environments, encrypt data at rest using customer-managed keys stored inside Azure Key Vault.
Auditing and monitoring
Azure allows monitoring Azure Files using Azure Monitor and Advanced Threat Protection for Azure Storage.
Best practices
Enable log alerts using the Azure Monitor service to track access to Azure Files and raise alerts (such as multiple failed access attempts to Azure Files in a short period of time).
Enable Azure Defender for Storage to receive security alerts inside the Azure Security Center console.
Enable Azure storage logging to audit all authorisation events for access to the Azure storage.