List of security threats and security alerts - Microsoft Defender for Cloud (2024)

  • Article

Data security becomes a top priority as organizations shift data to cloud storage solutions like Azure Storage. This document outlines common security threats and risks associated with misconfigured settings and the security alerts Microsoft Defender for Storage provides to detect and respond to potential security threats.

Security threats in cloud-based storage services

Azure Storage is a widely used cloud storage solution, and like any cloud-based service, it is susceptible to various security threats. Common security threats in Azure Storage include:

  • Access token abuse and leakage
  • Lateral movement from compromised workloads
  • Compromised third-party partners with privileged permissions
  • Credentials theft
  • Reconnaissance with search engines
  • Data collection by blob hunting
  • Insider threats with existing permissions

These threats can result in malware uploads, data corruption, and sensitive data exfiltration, posing significant risks.

List of security threats and security alerts - Microsoft Defender for Cloud (1)

In addition to security threats, configuration errors might inadvertently expose sensitive resources. Some common misconfiguration issues include:

  • Inadequate access controls and networking rules, leading to unintended data exposure on the internet
  • Insufficient authentication mechanisms
  • Lack of data encryption protocols for both data in transit and at rest

To minimize the risk of security breaches and configuration errors, security teams employ a combination of posture management tools and workload protection tools. These tools ensure that Azure Storage remains secure by providing visibility into early signs of breaches, helping prevent attacks, and maintaining secure configurations.

Microsoft security researchers have analyzed the attack surface of storage services. The potential security risks are described in the threat matrix for cloud-based storage services, which are based on the MITRE ATT&CK® framework, a knowledge base for the tactics and techniques employed in cyber-attacks.

What kind of security alerts does Microsoft Defender for Storage provide?

Tip

For a comprehensive list of all Defender for Storage alerts, see the alerts reference guide page. This is useful for workload owners who want to know what threats can be detected and help SOC teams gain familiarity with detections before investigating them. Learn more about Defender for Cloud security alerts and how to respond to them.

Security alerts are triggered in the following scenarios:

ScenarioDescription
Malicious content uploadMalware Scanning scans every blob uploaded to your storage accounts. It detects ransomware, viruses, spyware, and other malware uploaded to the storage account, helping you prevent it from entering the organization and spreading. The classic malware hash analysis alert operates differently from Malware Scanning. It compares the uploaded blob/file hash with a list of known malicious hash signatures rather than analyzing the file contents for malware.
Sensitive data exposure eventDetection of access level change allowing unauthenticated public access to blob containers with sensitive data from the internet
Suspicious activities on resources with sensitive dataDetection of suspicious activities occurring on blob containers containing sensitive data
Compromised, misconfigured and unusual authentication tokensDetection of compromised SAS tokens used for data plane authentication and operations, and detection of unusual SAS tokens that can be generated by a malicious actor
Data and permissions inspectionDetection of unusual exploration of the data and inspection of access permissions
Data exfiltrationDetection of unusual extraction of data from storage accounts
Data deletionDetection of unusual deletions in storage accounts
Blob-hunting attemptsDetection of collection attempts by scanning and enumerating resources for publicly exposed storage resources.
Read more on how to detect, investigate and prevent blob-hunting.
Unusual access patternsDetection of unusual access to storage accounts from unusual locations, applications, and with unusual authentication
Suspicious access signaturesDetection of known suspicious IP addresses by Microsoft Threat Intelligence, known Tor exit nodes, and known suspicious applications
Phishing campaignsDetection of phishing content hosted on storage accounts and identified as part of a phishing attack impacting Microsoft 365 users

Security alerts include details of the suspicious activity, relevant investigation steps, remediation actions, and security recommendations. Alerts can be exported to Microsoft Sentinel or any other third-party SIEM/XDR tool. Learn more about how to stream alerts to a SIEM, SOAR, or IT Service Management solution.

Understanding the differences between Malware Scanning and hash reputation analysis 

Defender for Storage offers two capabilities to detect malicious content uploaded to storage accounts: Malware Scanning (paid add-on feature available only on the new plan) and hash reputation analysis (available in all plans).

Malware Scanning (paid add-on feature available only on the new plan)

Malware Scanning leverages Microsoft Defender Antivirus (MDAV) to scan blobs uploaded to Blob storage, providing a comprehensive analysis that includes deep file scans and hash reputation analysis. This feature provides an enhanced level of detection against potential threats.

Hash reputation analysis (available in all plans)

Hash reputation analysis detects potential malware in Blob storage and Azure Files by comparing the hash values of newly uploaded blobs/files against those of known malware by Microsoft Threat Intelligence. Not all file protocols and operation types are supported with this capability, leading to some operations not being monitored for potential malware uploads. Unsupported use cases include SMB file shares and when a blob is created using Put Block and Put Block List.

In summary, Malware Scanning, which is only available on the new plan for Blob storage, offers a more comprehensive approach to malware detection by analyzing the full content of files and incorporating hash reputation analysis in its scanning methodology.

Next steps

In this article, you learned about Microsoft Defender for Storage.

Enable Defender for Storage

List of security threats and security alerts - Microsoft Defender for Cloud (2024)
Top Articles
Carbon offsetting: A guide for small businesses
The National Medal of Science
Custom Screensaver On The Non-touch Kindle 4
Riverrun Rv Park Middletown Photos
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Craigslist Cars Augusta Ga
Combat level
Zitobox 5000 Free Coins 2023
Citi Card Thomas Rhett Presale
Cape Cod | P Town beach
Knaben Pirate Download
Shariraye Update
What Happened To Maxwell Laughlin
Sound Of Freedom Showtimes Near Cinelux Almaden Cafe & Lounge
Nick Pulos Height, Age, Net Worth, Girlfriend, Stunt Actor
Aspen Mobile Login Help
The best TV and film to watch this week - A Very Royal Scandal to Tulsa King
Everything you need to know about Costco Travel (and why I love it) - The Points Guy
Kringloopwinkel Second Sale Roosendaal - Leemstraat 4e
Theater X Orange Heights Florida
Www.craigslist.com Savannah Ga
Minnick Funeral Home West Point Nebraska
Shreveport City Warrants Lookup
THE FINALS Best Settings and Options Guide
Www.craigslist.com Austin Tx
Idle Skilling Ascension
Dhs Clio Rd Flint Mi Phone Number
Craigslist Comes Clean: No More 'Adult Services,' Ever
Bend Missed Connections
Alternatieven - Acteamo - WebCatalog
Winterset Rants And Raves
Barbie Showtimes Near Lucas Cinemas Albertville
N.J. Hogenkamp Sons Funeral Home | Saint Henry, Ohio
ATM, 3813 N Woodlawn Blvd, Wichita, KS 67220, US - MapQuest
Rocketpult Infinite Fuel
Magicseaweed Capitola
Geology - Grand Canyon National Park (U.S. National Park Service)
Philadelphia Inquirer Obituaries This Week
Ursula Creed Datasheet
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
O'reilly's Palmyra Missouri
Ukraine-Krieg - Militärexperte: "Momentum bei den Russen"
Gasoline Prices At Sam's Club
All Characters in Omega Strikers
Busted Newspaper Mcpherson Kansas
Haunted Mansion Showtimes Near Millstone 14
Enjoy Piggie Pie Crossword Clue
Craigslist Charles Town West Virginia
Nfsd Web Portal
Latest Posts
Article information

Author: Stevie Stamm

Last Updated:

Views: 5698

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Stevie Stamm

Birthday: 1996-06-22

Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

Phone: +342332224300

Job: Future Advertising Analyst

Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.