@Daniel H what is the process to mitigate this issue with respect to LTRR backups that were made using the old key?
We recommend you to immediately restore the backup, change the key, take another backup, and delete the old backup and key from the key vault.
If it is a managed key or service managed key?
- If it's a customer-managed key, compromising the key is not sufficient to access the data, the attacker needs access to the storage account with the storage account key since the storage account that store the backup is encrypted by default.
- The attacker needs access to the managed identity that has permission to the key. This includes the Application Id and the MSI certificate. The MSI certificate is also encrypted by another service-managed certificate which would be difficult for the attacker to gain access to it and decrypt.
- Overall accessing backup is harder than you think. But to mitigate this issue, as I said above we recommend you to immediately restore the backup, change the key, take another backup, and delete the old backup and key from the key vault.
The same logic would apply to service managed key,
- To get to the LTR backup customer need to gain access to the service-managed certificate which is also encrypted by another service certificate.
- The attacker also needs to access the storage account that is encrypted to steal the customer data and decrypt it.
- We provide a service guarantee that any access to the customer data requires high-privilege access (JIT) and all requests are reviewed and audited.
I hope this information helps, please let me know if you have any additional questions.
Regards
Geetha