Hi Adam G
Backup data is stored in Azure Storage, where neither guests nor attackers have direct access to the backup storage or its contents. For virtual machine backups, snapshot creation and storage are handled entirely by the Azure fabric, with the guest’s only role being workload quiescing for application-consistent backups. For SQL and SAP HANA, the backup extension receives temporary, limited access to write to specific blobs. As a result, even in a compromised environment, existing backups cannot be altered or deleted by an attacker.
Azure Backup also includes built-in monitoring and alerting features that allow you to track events, configure automated responses, and detect unauthorized, suspicious, or malicious activities in real time. Backup Reports provide a unified view for analyzing usage, auditing backup and restore operations, and identifying trends at various levels of detail.
Additional validation checks ensure that only authorized users can perform sensitive actions. Critical operations require an extra layer of authentication, prompting users to enter a security PIN before https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature#prevent-attacks
For more details, please review the following document
ransomware-protection-with-azure-firewall
backup-plan-to-protect-against-ransomware
Please let me know if you face any challenge here, I can help you to resolve this issue further
Provide your valuable Comments.
Please do not forget to "Accept the answer” and “upvote it” wherever the information provided helps you, this can be beneficial to other community members.it would be greatly appreciated and helpful to others.