Is Your Data Safe in Azure?

Is Your Data Safe in Azure?

🗨️ A Deep Dive into Log Analytics Workspace Security

Azure Log Analytics workspaces are core components of Azure Monitor and, by extension, services like Microsoft Sentinel. They collect and store logs and telemetry used for monitoring, diagnostics, compliance, and security analytics. But many organizations wonder: How safe is this data? Who can delete it? Can it be protected from accidental or malicious removal? Let’s break it all down.

Append-Only Storage with Deletion Capabilities

By default, Azure Monitor Logs operates as an append-only datastore, meaning that logs ingested into a workspace are preserved and not modified in place. However, deletions are not fully prevented by default.

🛑 1. Deleting Log Entries

To delete individual log records in a specific table, you must call the Delete Data API. This operation requires the following permission:

Microsoft.OperationalInsights/workspaces/tables/deleteData/action(This is included in roles like Log Analytics Contributor) .The deletion is final and irreversible once processed.

👁️‍🗨️ What Protections Exist Against Deletion?

1. Azure Resource Locks

Azure supports resource locks at the Delete . For Log Analytics workspaces:

CanNotDelete lock: Prevents deletion of the workspace resource even if someone has delete permission.

Locks help prevent accidental deletion, but they can themselves be removed by someone with enough permissions.

👁️‍🗨️ 2. Soft-Delete Protection

Azure automatically places deleted Log Analytics workspaces into a soft-delete state for 14 days:

During this period, the workspace appears deleted but can be recovered with all data and configuration.

After the soft-delete window, the workspace (and its data) is purged and irrecoverable.

💥 You can also choose to delete permanently right away using a force option 💥

This soft-delete acts like a built-in “recycle bin,” helping protect against accidental deletions but not preventing force delete !

👁️‍🗨️3. Limitations of Protection Inside Azure Monitor

Even with RBAC and locks, if Azure subscription or tenant identities are compromised a malicious actor could remove locks, delete data, or delete workspaces. RBAC reduces the attack surface but doesn’t make deletion impossible if high-privilege accounts are breached.

Solution in simple :

📕 Export Critical Logs to Immutable Storage

Because Azure Monitor logs can be purged or deleted, export critical logs to an immutable Azure Storage account with legal hold or immutability policies (e.g., month-to-year retention that cannot be tampered with). This is essential for compliance and forensic readiness. Make seperate RBAC / User scope for backup data and for log analytics data.

#security #microsoft #data #log #cloud #azure