Persistence consists of techniques that attackers use to keep access to the storage account due to changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems.
|Firewall and virtual networks configuration changes
|Role-based access control permission
|Create SAS token
|Container access level property
|Trusted Azure services
|Trusted access based on a managed identity