An Azure service that stores unstructured data in the cloud as blobs.
Hello @ PANNARAT, MASSATRON
Thank you for reaching out to Microsoft Q&A.
I understand your concern, especially when embedded device updates require careful planning.
The good news is that your devices should continue to work with Azure Storage after the retirement of TLS 1.0 and TLS 1.1, as long as they successfully negotiate TLS 1.2.
Your current cipher suite, TLS_RSA_WITH_AES_256_CBC_SHA256, is a valid TLS 1.2 cipher suite. Since Azure Storage will continue to support TLS 1.2, devices using this cipher suite should still be able to connect and download files, provided the TLS handshake completes successfully.
If Azure Storage and the client are unable to agree on a mutually supported cipher suite, the TLS handshake will fail. In that case, the connection will be rejected, and any file transfer operation will not proceed.
Regarding an extension or grace period, Microsoft is retiring support only for TLS 1.0 and TLS 1.1. Since your devices already support TLS 1.2, no exception should be necessary. At this time, Microsoft has not announced any extension program for legacy TLS versions.
For long-term security and compatibility, Microsoft recommends moving to modern cipher suites that support Perfect Forward Secrecy (PFS), such as:
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
As a next step, recommend validating connectivity from one of your devices after setting the Storage account minimum TLS version to 1.2. If possible, capture the TLS handshake to confirm the negotiated protocol and cipher suite.
Reference:
https://learn.microsoft.com/azure/storage/common/transport-layer-security-configure-minimum-version
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".