Profile Applicability:
- Level 2
Description:
Storage Logging captures and records all requests made to the Azure Blob service, including read, write, and delete operations. Enabling this logging provides essential data for monitoring access patterns, troubleshooting issues, and performing security audits.
Rationale:
Activating Storage Logging helps detect unauthorized or suspicious activities, supports forensic investigations, and meets compliance requirements by maintaining comprehensive access logs.
Impact:
Pros:
Increases visibility into blob service operations.
Facilitates security monitoring and compliance auditing.
Assists in troubleshooting performance and operational issues.
Cons:
Can lead to increased storage usage and associated costs due to log retention.
Requires ongoing management of logging and retention policies.
Default Value:
Storage Logging is disabled by default and must be enabled explicitly.
Pre-requisites:
Azure Storage Account with Blob service enabled.
Appropriate permissions to configure logging settings.
Remediation
Test Plan:
Using Azure Portal:
Sign in to https://portal.azure.com.
Navigate to the Storage Account.
Under Monitoring, select Diagnostic settings or Storage Logging.
Confirm that logging is enabled for the Blob service with Read, Write, and Delete operations selected.
Using Azure CLI:
Check logging settings for blob service:
# az storage logging show --account-name <storage-account-name> --services b
Verify logging for r (read), w (write), and d (delete) is enabled.
Implementation Plan
Using Azure Portal:
Enable logging for the Blob service with Read, Write, and Delete operations selected.
Configure the retention period according to policy.
Save and verify the settings.
Using Azure CLI:
Enable logging with all operations and set retention days:
# az storage logging update --services b --log rwd --retention-days <days> --account-name <storage-account-name>
Confirm logging is configured properly.
Backout Plan
Using Azure Portal:
Disable logging if necessary.
Assess impact on monitoring and auditing capabilities.
Using Azure CLI:
Disable logging:
# az storage logging update --services b --log '' --retention-days 0 --account-name <storage-account-name>
References: