MCADDF

[MISCONFIG-010]: Unencrypted Data Storage

Metadata

| Attribute | Details | |—|—| | Technique ID | MISCONFIG-010 | | MITRE ATT&CK v18.1 | T1530 – Data from Cloud Storage Object | | Tactic | Collection / Impact | | Platforms | Multi-Env (Azure Storage, Azure Files, Azure Disks, Azure SQL, Windows Servers, SaaS) | | Severity | Critical | | Technique Status | ACTIVE | | Last Verified | 2026-01-10 | | Affected Versions | All Azure regions and SKUs; Windows Server 2016–2025; Azure SQL Database/Managed Instance; Azure Storage accounts | | Patched In | N/A (mitigated via encryption-at-rest features and policy) | | Author | SERVTEPArtur Pchelnikau |


2. EXECUTIVE SUMMARY

Operational Risk

Compliance Mappings

| Framework | Control / ID | Description | |—|—|—| | CIS Benchmark | Azure Foundations DP-4 / related storage & SQL controls | Require encryption at rest for storage accounts, disks, and SQL data. | | DISA STIG | SRG-APP-000429-DB / OS disk encryption families | Enforce database and host disk encryption for sensitive data. | | CISA SCuBA | Data Protection DP controls | Encryption of cloud data at rest and in backup repositories. | | NIST 800-53 | SC-12, SC-28 | Cryptographic protection and protection of information at rest. | | GDPR | Art. 32 | Encryption of personal data as an appropriate technical control. | | DORA | Art. 9 | Protection and prevention measures for critical financial data, including encryption. | | NIS2 | Art. 21 | Measures for data security and access control in essential/important entities. | | ISO 27001 | A.8.24, A.8.25 | Use of cryptography and protection of data at rest in storage and backups. | | ISO 27005 | Risk Scenario | Compromise of unencrypted production, backup, or snapshot data.

3. TECHNICAL PREREQUISITES

Supported Versions:

4. ENVIRONMENTAL RECONNAISSANCE

Azure Storage & SQL Recon (PowerShell)

# List storage accounts without infrastructure encryption
Get-AzStorageAccount | Select-Object ResourceGroupName,StorageAccountName,
  EnableHttpsTrafficOnly,SupportsHttpsTrafficOnly,EnableHierarchicalNamespace, 
  Encryption

# Azure SQL TDE status
Get-AzSqlDatabase | Select-Object ServerName,DatabaseName,TransparentDataEncryptionState

What to Look For:

Disk & Snapshot Recon

Get-AzDisk | Select-Object Name,Encryption,DiskState
Get-AzSnapshot | Select-Object Name,Encryption

What to Look For:

5. DETAILED EXECUTION METHODS AND THEIRS STEPS

METHOD 1 – Exploit Unencrypted Azure Storage and Disks

Supported Versions: All Azure subscriptions.

Step 1: Copy Unencrypted Blob or File Content

Objective: Demonstrate how an attacker with storage key or SAS token can bulk exfiltrate unencrypted data.

Command (Azure CLI):

# List blobs in a container
az storage blob list \
  --account-name <storageAccount> \
  --container-name <container> \
  --auth-mode key -o table

# Download an entire container
az storage blob download-batch \
  --account-name <storageAccount> \
  --source <container> \
  --destination ./loot \
  --auth-mode key

Expected Output:

OpSec & Evasion:

Step 2: Export or Mount Unencrypted VHDs

Objective: Mount or copy managed disks or snapshots that are not encrypted.

Command (PowerShell):

# Export URI of a snapshot (if allowed)
Grant-AzSnapshotAccess -ResourceGroupName <rg> -SnapshotName <snap> -DurationInSecond 3600 -Access Read

Expected Output:

METHOD 2 – Exploit Unencrypted Azure SQL

Supported Versions: Azure SQL Database / Managed Instance.

Step 1: Identify Databases with TDE Disabled

Get-AzSqlDatabase | Where-Object { $_.TransparentDataEncryptionState -eq "Disabled" } |
  Select-Object ServerName,DatabaseName

Step 2: Export Plaintext Bacpac or Backup

Objective: Export entire unencrypted database for offline analysis.

Outline:

OpSec & Evasion:

6. ATTACK SIMULATION & VERIFICATION (Atomic Red Team)

There is no specific Atomic Red Team test dedicated solely to unencrypted-at-rest misconfiguration. Use storage exfiltration tests for T1530 (Data from Cloud Storage Object) to simulate data theft once misconfiguration is present.

7. TOOLS & COMMANDS REFERENCE

Azure CLI

# Check encryption config for a storage account
az storage account show -n <account> -g <rg> --query "encryption"

# Check SQL TDE
az sql db tde show -g <rg> -s <server> -n <db>

PowerShell Modules

8. SPLUNK DETECTION RULES

Rule 1: Access to Storage Accounts with Encryption Disabled

SPL Idea:

9. MICROSOFT SENTINEL DETECTION

Query 1: SQL Databases with TDE Disabled

AzureDiagnostics
| where ResourceType == "DATABASES"
| where Category == "SQLSecurityAuditEvents" or Category == "SQLInsights"
| summarize any_prop = any(Properties_s) by Resource

Supplement with Azure Resource Graph queries:

resources
| where type == "microsoft.sql/servers/databases"
| extend tde = properties.encryption
| where tde != "Enabled" and tde != "True"

10. WINDOWS EVENT LOG MONITORING

For on-prem volumes, ensure BitLocker and file server auditing events are collected:

11. SYSMON DETECTION PATTERNS

Use Sysmon to track:

12. MICROSOFT DEFENDER FOR CLOUD

Key recommendations:

Review and remediate all High/Medium recommendations under Data Protection.

13. MICROSOFT PURVIEW (UNIFIED AUDIT LOG)

For M365 workloads, ensure:

14. DEFENSIVE MITIGATIONS

Priority 1: CRITICAL

Priority 2: HIGH

Validation Command (Verify Fix)

Get-AzStorageAccount | Select-Object StorageAccountName,Encryption
Get-AzSqlDatabase | Select-Object ServerName,DatabaseName,TransparentDataEncryptionState
Get-AzDisk | Select-Object Name,Encryption

15. DETECTION & INCIDENT RESPONSE

Indicators of Compromise (IOCs)

Forensic Artifacts

Response Procedures

  1. Identify unencrypted data sources and classify sensitivity.
  2. Contain by restricting access keys, SAS tokens, and IP ranges.
  3. Enable encryption at rest and rotate keys.
  4. Conduct breach assessment if exfiltration is suspected; notify per GDPR/NIS2 as necessary.
Step Phase Technique Description
1 Initial Access Compromise of subscription or storage keys Attacker gains keys or privileged role.
2 Discovery Cloud Storage Discovery (T1530, T1526) Attacker enumerates storage and databases.
3 Current Step MISCONFIG-010 – Unencrypted Data Storage Attacker targets unencrypted assets, snapshots, or exports.
4 Collection Bulk export of data Offline harvesting, decryption not required.
5 Exfiltration & Impact Data breach, extortion Regulatory reporting and brand damage.

17. REAL-WORLD EXAMPLES

Example 1: Public Cloud Storage Breaches

Example 2: Unencrypted SQL Backups