CMK encryption on existing Azure Recovery Vault and Deny policies on ARV

Sanin Joseph 1 Reputation point
2022-11-09T23:36:56.8+00:00

At University we use Azure Recovery Vaults for storing backups.
We at the university are currently checking our resilience to attacks and was seeking confirmation on the below observations.

• Once a backup exists in a vault, the vault and the backups in the vault cannot be encrypted using CMK.
• The backup in the vault cannot be modified, once written to the vault.
• With the Soft Delete feature enabled any backups that are deleted can be recovered within 14 days.

Aside we are also considering setting up a policy to deny the following at a resource level.

a. Microsoft.RecoveryServices/Vaults/delete
b. microsoft.recoveryservices/Vaults/backupPolicies/delete
c. microsoft.recoveryservices/Vaults/backupconfig/write
d. microsoft.recoveryservices/Vaults/backupFabrics/protectionContainers/protectedItems/delete

How can we achieve such a DENY policy using Azure Policy? or some other mechanism?

We are aware of a custom RBAC permissions model e.g., custom Contributor role, but this will see a longer implementation timeline.
Right now, we are working at a tactical solution to address the need till such time Immutable backs gets rolled out in Australia region.

Azure FastTrack
Azure FastTrack
Azure: A cloud computing platform and infrastructure for building, deploying and managing applications and services through a worldwide network of Microsoft-managed datacenters.FastTrack: This tag is no longer in use. Please use 'Azure Startups' instead.
75 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Luke Murray 10,526 Reputation points MVP
    2023-01-17T08:49:13.83+00:00

    Hi, Sanin

    Q. Once a backup exists in a vault, the vault and the backups in the vault cannot be encrypted using CMK.

    A. "This feature allows you to encrypt new Recovery Services vaults only. Any vaults containing existing items registered or attempted to be registered to it aren't supported."

    https://learn.microsoft.com/en-us/azure/backup/encryption-at-rest-with-cmk?tabs=portal

    Q. • The backup in the vault cannot be modified, once written to the vault.

    A. Correct, this is offline.

    https://learn.microsoft.com/en-us/azure/backup/guidance-best-practices

    Q. With the Soft Delete feature enabled any backups that are deleted can be recovered within 14 days.

    A. Correct, Soft Delete will allow restore of backup jobs.

    For immutable vault - this is currently in PREVIEW in Australia East:

    User's image

    In regards to Azure Policy, the DenyAction policy effect is also in Public Preview: https://techcommunity.microsoft.com/t5/azure-paas-blog/quickstart-denyaction-effect-in-azure-policy/ba-p/3705112

    I propose you take a look at Resource Guard - MFA for Azure Backups - https://learn.microsoft.com/en-us/azure/backup/multi-user-authorization?tabs=azure-portal&pivots=vaults-recovery-services-vault

    Resource Guard, will allow you to set specific users and approval, and restrictions and, if needed, prompt for MFA before any operations such as deleting a backup point.

    0 comments No comments