Skip to content

Files

Latest commit

12b91e2 · Apr 8, 2022

History

History
77 lines (49 loc) · 5.43 KB

faq-security.md

File metadata and controls

77 lines (49 loc) · 5.43 KB
title description ms.service ms.workload ms.topic author ms.author ms.date ms.custom
Security FAQs for Azure NetApp Files | Microsoft Docs
Answers frequently asked questions (FAQs) about Azure NetApp Files security.
azure-netapp-files
storage
conceptual
b-hchen
anfdocs
04/08/2021
references_regions

Security FAQs for Azure NetApp Files

This article answers frequently asked questions (FAQs) about Azure NetApp Files security.

Can the network traffic between the Azure VM and the storage be encrypted?

Azure NetApp Files data traffic is inherently secure by design, as it does not provide a public endpoint and data traffic stays within customer-owned VNet. Data-in-flight is not encrypted by default. However, data traffic from an Azure VM (running an NFS or SMB client) to Azure NetApp Files is as secure as any other Azure-VM-to-VM traffic.

NFSv3 protocol does not provide support for encryption, so this data-in-flight cannot be encrypted. However, NFSv4.1 and SMB3 data-in-flight encryption can optionally be enabled. Data traffic between NFSv4.1 clients and Azure NetApp Files volumes can be encrypted using Kerberos with AES-256 encryption. See Configure NFSv4.1 Kerberos encryption for Azure NetApp Files for details. Data traffic between SMB3 clients and Azure NetApp Files volumes can be encrypted using the AES-CCM algorithm on SMB 3.0, and the AES-GCM algorithm on SMB 3.1.1 connections. See Create an SMB volume for Azure NetApp Files for details.

Can the storage be encrypted at rest?

All Azure NetApp Files volumes are encrypted using the FIPS 140-2 standard. All keys are managed by the Azure NetApp Files service.

Is Azure NetApp Files cross-region replication traffic encrypted?

Azure NetApp Files cross-region replication uses TLS 1.2 AES-256 GCM encryption to encrypt all data transferred between the source volume and destination volume. This encryption is in addition to the Azure MACSec encryption that is on by default for all Azure traffic, including Azure NetApp Files cross-region replication.

How are encryption keys managed?

Key management for Azure NetApp Files is handled by the service. A unique XTS-AES-256 data encryption key is generated for each volume. An encryption key hierarchy is used to encrypt and protect all volume keys. These encryption keys are never displayed or reported in an unencrypted format. Encryption keys are deleted immediately when a volume is deleted.

Support for customer-managed keys (Bring Your Own Key) using Azure Dedicated HSM is available on a controlled basis in the East US, South Central US, West US 2, and US Gov Virginia regions. You can request access at anffeedback@microsoft.com. As capacity becomes available, requests will be approved.

Can I configure the NFS export policy rules to control access to the Azure NetApp Files service mount target?

Yes, you can configure up to five rules in a single NFS export policy.

Can I use Azure RBAC with Azure NetApp Files?

Yes, Azure NetApp Files supports Azure RBAC features. Along with the built-in Azure roles, you can create custom roles for Azure NetApp Files.

For the complete list of Azure NetApp Files permissions, see Azure resource provider operations for Microsoft.NetApp.

Are Azure Activity Logs supported on Azure NetApp Files?

Azure NetApp Files is an Azure native service. All PUT, POST, and DELETE APIs against Azure NetApp Files are logged. For example, the logs show activities such as who created the snapshot, who modified the volume, and so on.

For the complete list of API operations, see Azure NetApp Files REST API.

Can I use Azure policies with Azure NetApp Files?

Yes, you can create custom Azure policies.

However, you cannot create Azure policies (custom naming policies) on the Azure NetApp Files interface. See Guidelines for Azure NetApp Files network planning.

When I delete an Azure NetApp Files volume, is the data deleted safely?

Deletion of an Azure NetApp Files volume is performed programmatically with immediate effect. The delete operation includes deleting keys used for encrypting data at rest. There is no option for any scenario to recover a deleted volume once the delete operation is executed successfully (via interfaces such as the Azure portal and the API.)

How are the Active Directory Connector credentials stored on the Azure NetApp Files service?

The AD Connector credentials are stored in the Azure NetApp Files control plane database in an encrypted format. The encryption algorithm used is AES-256 (one-way).

Next steps