Prevention of replication in Azure blob storage
The built in geo-replication in Azure only support replication to a secondary region in the same account, so this is not an avenue that could be used to egress data.
Given that, the scenario you are talking about is essentially a user downloading the data and then uploading to another storage account, or using something like AzCopy to move data from one account to another. There is nothing built into Azure that would prevent the user from doing that if they have the ability to download data from your storage account. There are some things you could look to do to minimise the risk:
- Only provide access to storage accounts to users who need them
- Do not provide users with access to storage account keys and instead use SaS tokens which are timebound and restricted to only the resources they need access to
- Use Privileged Identity Management to require elevation with approval for any user who must have access to the storage account in the Azure Portal or CLI
- Enrol your storage accounts in Azure Security centre to detect suspicious activity
- Restrict access to your storage account using IP restrictions to only allow access from specific locations