Control: 3.8 Ensure soft delete is enabled for Azure Storage
The Azure Storage blobs contain data like ePHI, Financial, secret or personal. Erroneously modified or deleted accidentally by an application or other storage account user cause data loss or data unavailability. It is recommended the Azure Storage be made recoverable by enabling soft delete configuration. This is to save and recover data when blobs or blob snapshots are deleted.
There could be scenarios where users accidentally run delete commands on Azure Storage blobs or blob snapshot or attacker/malicious user does it deliberately to cause disruption. Deleting an Azure Storage blob leads to immediate data loss / non-accessible data. There is a property of Azure Storage blob service to make recoverable blobs.
Enabling this configuration for azure storage ensures that even if blobs/data were deleted from the storage account, Blobs/data objects remain recoverable for a particular time which set in the "Retention policies"
[Retention policies can be 7 days to 365 days].
- Login to Azure Storage Accounts
- For each Storage Account, navigate to
set soft delete enabledand enter a number of days you want to retain soft deleted data.
From Command Line
retention days in below command
az storage blob service-properties delete-policy update --days-retained <RetentionDaysValue> --account-name <StorageAccountName> --enable true
steampipe check azure_compliance.control.cis_v130_3_8
This control uses a named query:storage_account_soft_delete_enabled