SlideShare a Scribd company logo
4
Most read
5
Most read
8
Most read
Data Encryption - Storage Service
Udaiappa Ramachandran ( Udai )
//linkedin.com/in/udair
Who am I?
• Udaiappa Ramachandran ( Udai )
• CTO, Akumina, Inc.,
• Consultant
• Focus on Cloud Computing
• Microsoft Azure, Amazon Web Services and Google
• New Hampshire Cloud User Group (http://www.meetup.com/nashuaug )
• http://cloudycode.wordpress.com
• @nhcloud
Agenda
• Storage Service
• Key Vault Service
• Managed Service Identity
• Data Encryption Methods
• AWS S3 Encryption Methods
• Best practices
• Demo
• References
• Q & A
Azure Storage Service
• Blobs (REST-based object storage for unstructured data)
• https://<account>.blob.core.windows.net
• Queues (scalable queue)
• https://<account>.queue.core.windows.net
• Tables (Tabular data storage)
• https://<account>.table.core.windows.net
• Files (File shares that use the standard SMB 3.0 protocol)
• https://<account>.file.core.windows.net
Key Vault Service
• Safeguard cryptographic keys and other secrets used by cloud apps and services
• Increase security and control over keys and passwords
• Create and import encryption keys in minutes
• Applications have no direct access to keys
• Use FIPS 140-2 Level 2 validated HSMs
• Reduce latency with cloud scale and global redundancy
• Simplify and automate tasks for SSL/TLS certificates
Managed Service Identity (MSI)
• Azure Resource Manager receives a message to enable MSI on a VM.
• Azure Resource Manager creates a Service Principal in Azure AD to represent the
identity of the VM. The Service Principal is created in the Azure AD tenant that is
trusted by this subscription.
• Azure Resource Manager configures the Service Principal details in the MSI VM
Extension of the VM. This step includes configuring client ID and certificate used by
the extension to get access tokens from Azure AD.
• Now that the Service Principal identity of the VM is known, it can be granted access
to Azure resources. For example, if your code needs to call Azure Resource Manager,
then you would assign the VM’s Service Principal the appropriate role using Role-
Based Access Control (RBAC) in Azure AD. If your code needs to call Key Vault, then
you would grant your code access to the specific secret or key in Key Vault.
• Your code running on the VM requests a token from a local endpoint that is hosted
by the MSI VM extension: http://localhost:50342/oauth2/token. The resource
parameter specifies the service to which the token is sent. For example, if you want
your code to authenticate to Azure Resource Manager, you would use
resource=https://management.azure.com/.
• The MSI VM Extension uses its configured client ID and certificate to request an
access token from Azure AD. Azure AD returns a JSON Web Token (JWT) access
token.
• Your code sends the access token on a call to a service that supports Azure AD
authentication.
• Azure services that supports MSI
• Virtual Machines (Windows and Linux)
• App Services
• Functions
• Data Factory V2
Source: https://docs.microsoft.com/en-us/azure/active-directory/managed-service-identity/overview
Data Encryption
• Custom Encryption
• Write your own encryption using AES256 or other encryption
• Client Side Encryption
• Azure Storage provides Envelop techniques using SDK
• Server Side Encryption
• At Rest encryption
Client-Side Encryption
• The object data is encrypted using content encryption key (CEK) generated by storage client library
• The CEK is then wrapped (encrypted) using key encryption key (KEK)
• For tighter security, the encryption key is stored in the Azure Key Vault, ensuring that only
authenticated users/applications can access.
• Encrypted data along with KEK transmitted via https to the azure storage
• For data retrieval, the process is reversed. Encrypted data is retrieved from Azure Storage and
decrypted using the encryption key stored in the Azure Key Vault.
Server-Side Encryption
• Encrypted at REST before writing to disk
• Service managed keys
• Customer managed keys in Azure Key Vault
• Customer-managed keys on customer-controlled hardware
AWS S3 Encryption
• Server Side Encryption
• S3 Managed Keys
• AWS Key Management Keys (KMS) Managed Keys
• Customer Managed Keys
• Client Side Encryption
• KMS Managed Keys
• Customer Managed Keys
• All keys can be protected using IAM control so that keys are securely accessed
within cloud services.
Google Cloud Storage Encryption
• Server Side Encryption
• Cloud Storage default encryption using AES256
• Google Key Management Keys (KMS) Managed Keys
• Customer Managed Keys
• Client Side Encryption
• KMS Managed Keys
• Customer Managed Keys
• All keys can be protected using IAM control so that keys are securely accessed
within cloud services.
Best Practices
• It is always possible to encrypt data using both client-side and server-side
• With encryption there is overhead involved which can have impact on
performance
• For MSI enabled testing during development you can set the environment system
variable “AzureServicesAuthConnectionString” with value in the format of
RunAs=App;AppId=<CLIENTID>;TenantId=<TENANTID>;AppKey=<CLIENTSECRET>;
Demo
• Download Slide from
• https://www.slideshare.net/UdaiappaRamachandran
• Download Source from
• https://github.com/nhcloud/techtalk
Reference
• //blog.akumina.com/2018/04/03/akumina-data-encryption-using-microsoft-azure-
storage-service/
• //docs.microsoft.com/en-us/azure/active-directory/msi-overview#which-azure-
services-support-managed-service-identity
• //docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest
• //docs.microsoft.com/en-us/azure/key-vault/key-vault-whatis
• //aws.amazon.com/kms
• //docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html
• //cloud.google.com/storage/docs/encryption/
• //cloud.google.com/kms/
Q & A
Thank you for attending
Boston Codecamp (bcc29)

More Related Content

PPTX
Azure Identity and access management
PPTX
Azure active directory
PPTX
Govern your Azure environment through Azure Policy
PDF
Microsoft Azure Security Overview
PPTX
Azure role based access control (rbac)
PDF
Azure Security Overview
PDF
[Azure Governance] Lesson 1 : Azure Naming Convention
PDF
Azure DDoS Protection Standard
Azure Identity and access management
Azure active directory
Govern your Azure environment through Azure Policy
Microsoft Azure Security Overview
Azure role based access control (rbac)
Azure Security Overview
[Azure Governance] Lesson 1 : Azure Naming Convention
Azure DDoS Protection Standard

What's hot (20)

PPTX
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
PDF
[Azure Governance] Lesson 4 : Azure Policy
PPTX
Azure governance
PPTX
Azure Migrate
PPTX
Azure Security Fundamentals
PPTX
Azure key vault
PDF
AWS S3 and GLACIER
PDF
Microsoft Azure Active Directory
PPTX
Azure Cloud Governance
PDF
AWS IAM -- Notes of 20130403 Doc Version
PPTX
Azure Compute, Networking and Storage Overview
PPTX
Azure Security Center- Zero to Hero
PPTX
Azure Security Overview
PPTX
Azure Migration Program Pitch Deck
PDF
Building an Enterprise-Grade Azure Governance Model
PPTX
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
PDF
AWS Single Sign-On (SSO) 서비스 집중 탐구 - 윤석찬 :: AWS Unboxing 온라인 세미나
PPTX
PDF
Access Security - Privileged Identity Management
PDF
Databricks secure deployments and security baselines, doug march 2022
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
[Azure Governance] Lesson 4 : Azure Policy
Azure governance
Azure Migrate
Azure Security Fundamentals
Azure key vault
AWS S3 and GLACIER
Microsoft Azure Active Directory
Azure Cloud Governance
AWS IAM -- Notes of 20130403 Doc Version
Azure Compute, Networking and Storage Overview
Azure Security Center- Zero to Hero
Azure Security Overview
Azure Migration Program Pitch Deck
Building an Enterprise-Grade Azure Governance Model
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
AWS Single Sign-On (SSO) 서비스 집중 탐구 - 윤석찬 :: AWS Unboxing 온라인 세미나
Access Security - Privileged Identity Management
Databricks secure deployments and security baselines, doug march 2022
Ad

Similar to Data Encryption - Azure Storage Service (20)

PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PPTX
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
PDF
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
PPTX
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
PDF
Best Practices in Cloud Security
PPTX
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
PPTX
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPTX
Top 13 best security practices for Azure
PPTX
Design Practices for a Secure Azure Solution
PPTX
Azure Community Tour 2019 - AZUGDK
PPTX
Enter The Matrix Securing Azure’s Assets
PDF
Enterprise Cloud Security
PPTX
Top 13 best security practices
PPTX
SecureAzureServicesUsingADAuthentication.pptx
PPTX
Zero credential development with managed identities
PPTX
Zero Credential Development with Managed Identities for Azure resources
PPTX
Azure Key Vault - Getting Started
PPTX
Azure Fundamentals Part 3
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Best Practices in Cloud Security
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
CSS17: Houston - Azure Shared Security Model Overview
Top 13 best security practices for Azure
Design Practices for a Secure Azure Solution
Azure Community Tour 2019 - AZUGDK
Enter The Matrix Securing Azure’s Assets
Enterprise Cloud Security
Top 13 best security practices
SecureAzureServicesUsingADAuthentication.pptx
Zero credential development with managed identities
Zero Credential Development with Managed Identities for Azure resources
Azure Key Vault - Getting Started
Azure Fundamentals Part 3
 
Ad

More from Udaiappa Ramachandran (20)

PPTX
Transform Any Website into a Conversational Experience with NLWeb
PPTX
Scalable Multi-Agent AI with AutoGen by Udai
PPTX
Building .NET AI Applications with Google AI: Leveraging Vertex AI and Gemini
PPTX
Microsoft Fabric by Udaiappa Ramachandran.pptx
PPTX
.NET Aspire Presentation by Udaiappa Ramachandran
PPTX
AI-Driven Dynamic Data Querying and Visualization with KQL and SQL
PPTX
Advanced Application Protection with Azure WAF
PPTX
RAG Patterns and Vector Search in Generative AI
PPTX
Level up your security using Intune.pptx
PPTX
Building AI-Driven Apps Using Semantic Kernel.pptx
PPTX
AI-Plugins-Planners-Persona-SemanticKernel.pptx
PPTX
DOTNET8.pptx
PPTX
AzureSynapse.pptx
PPTX
Vector Search using OpenAI in Azure Cognitive Search.pptx
PPTX
AzureOpenAI.pptx
PPTX
OpenAI-Copilot-ChatGPT.pptx
PPTX
DiagnoseAndSolveproblems.pptx
PPTX
PPTX
CosmosDB.pptx
PPTX
Transform Any Website into a Conversational Experience with NLWeb
Scalable Multi-Agent AI with AutoGen by Udai
Building .NET AI Applications with Google AI: Leveraging Vertex AI and Gemini
Microsoft Fabric by Udaiappa Ramachandran.pptx
.NET Aspire Presentation by Udaiappa Ramachandran
AI-Driven Dynamic Data Querying and Visualization with KQL and SQL
Advanced Application Protection with Azure WAF
RAG Patterns and Vector Search in Generative AI
Level up your security using Intune.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
AI-Plugins-Planners-Persona-SemanticKernel.pptx
DOTNET8.pptx
AzureSynapse.pptx
Vector Search using OpenAI in Azure Cognitive Search.pptx
AzureOpenAI.pptx
OpenAI-Copilot-ChatGPT.pptx
DiagnoseAndSolveproblems.pptx
CosmosDB.pptx

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Data Encryption - Azure Storage Service

  • 1. Data Encryption - Storage Service Udaiappa Ramachandran ( Udai ) //linkedin.com/in/udair
  • 2. Who am I? • Udaiappa Ramachandran ( Udai ) • CTO, Akumina, Inc., • Consultant • Focus on Cloud Computing • Microsoft Azure, Amazon Web Services and Google • New Hampshire Cloud User Group (http://www.meetup.com/nashuaug ) • http://cloudycode.wordpress.com • @nhcloud
  • 3. Agenda • Storage Service • Key Vault Service • Managed Service Identity • Data Encryption Methods • AWS S3 Encryption Methods • Best practices • Demo • References • Q & A
  • 4. Azure Storage Service • Blobs (REST-based object storage for unstructured data) • https://<account>.blob.core.windows.net • Queues (scalable queue) • https://<account>.queue.core.windows.net • Tables (Tabular data storage) • https://<account>.table.core.windows.net • Files (File shares that use the standard SMB 3.0 protocol) • https://<account>.file.core.windows.net
  • 5. Key Vault Service • Safeguard cryptographic keys and other secrets used by cloud apps and services • Increase security and control over keys and passwords • Create and import encryption keys in minutes • Applications have no direct access to keys • Use FIPS 140-2 Level 2 validated HSMs • Reduce latency with cloud scale and global redundancy • Simplify and automate tasks for SSL/TLS certificates
  • 6. Managed Service Identity (MSI) • Azure Resource Manager receives a message to enable MSI on a VM. • Azure Resource Manager creates a Service Principal in Azure AD to represent the identity of the VM. The Service Principal is created in the Azure AD tenant that is trusted by this subscription. • Azure Resource Manager configures the Service Principal details in the MSI VM Extension of the VM. This step includes configuring client ID and certificate used by the extension to get access tokens from Azure AD. • Now that the Service Principal identity of the VM is known, it can be granted access to Azure resources. For example, if your code needs to call Azure Resource Manager, then you would assign the VM’s Service Principal the appropriate role using Role- Based Access Control (RBAC) in Azure AD. If your code needs to call Key Vault, then you would grant your code access to the specific secret or key in Key Vault. • Your code running on the VM requests a token from a local endpoint that is hosted by the MSI VM extension: http://localhost:50342/oauth2/token. The resource parameter specifies the service to which the token is sent. For example, if you want your code to authenticate to Azure Resource Manager, you would use resource=https://management.azure.com/. • The MSI VM Extension uses its configured client ID and certificate to request an access token from Azure AD. Azure AD returns a JSON Web Token (JWT) access token. • Your code sends the access token on a call to a service that supports Azure AD authentication. • Azure services that supports MSI • Virtual Machines (Windows and Linux) • App Services • Functions • Data Factory V2 Source: https://docs.microsoft.com/en-us/azure/active-directory/managed-service-identity/overview
  • 7. Data Encryption • Custom Encryption • Write your own encryption using AES256 or other encryption • Client Side Encryption • Azure Storage provides Envelop techniques using SDK • Server Side Encryption • At Rest encryption
  • 8. Client-Side Encryption • The object data is encrypted using content encryption key (CEK) generated by storage client library • The CEK is then wrapped (encrypted) using key encryption key (KEK) • For tighter security, the encryption key is stored in the Azure Key Vault, ensuring that only authenticated users/applications can access. • Encrypted data along with KEK transmitted via https to the azure storage • For data retrieval, the process is reversed. Encrypted data is retrieved from Azure Storage and decrypted using the encryption key stored in the Azure Key Vault.
  • 9. Server-Side Encryption • Encrypted at REST before writing to disk • Service managed keys • Customer managed keys in Azure Key Vault • Customer-managed keys on customer-controlled hardware
  • 10. AWS S3 Encryption • Server Side Encryption • S3 Managed Keys • AWS Key Management Keys (KMS) Managed Keys • Customer Managed Keys • Client Side Encryption • KMS Managed Keys • Customer Managed Keys • All keys can be protected using IAM control so that keys are securely accessed within cloud services.
  • 11. Google Cloud Storage Encryption • Server Side Encryption • Cloud Storage default encryption using AES256 • Google Key Management Keys (KMS) Managed Keys • Customer Managed Keys • Client Side Encryption • KMS Managed Keys • Customer Managed Keys • All keys can be protected using IAM control so that keys are securely accessed within cloud services.
  • 12. Best Practices • It is always possible to encrypt data using both client-side and server-side • With encryption there is overhead involved which can have impact on performance • For MSI enabled testing during development you can set the environment system variable “AzureServicesAuthConnectionString” with value in the format of RunAs=App;AppId=<CLIENTID>;TenantId=<TENANTID>;AppKey=<CLIENTSECRET>;
  • 13. Demo • Download Slide from • https://www.slideshare.net/UdaiappaRamachandran • Download Source from • https://github.com/nhcloud/techtalk
  • 14. Reference • //blog.akumina.com/2018/04/03/akumina-data-encryption-using-microsoft-azure- storage-service/ • //docs.microsoft.com/en-us/azure/active-directory/msi-overview#which-azure- services-support-managed-service-identity • //docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest • //docs.microsoft.com/en-us/azure/key-vault/key-vault-whatis • //aws.amazon.com/kms • //docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html • //cloud.google.com/storage/docs/encryption/ • //cloud.google.com/kms/
  • 15. Q & A
  • 16. Thank you for attending Boston Codecamp (bcc29)