last sync: 2025-Jul-30 17:47:15 UTC

Storage accounts should use private link (excluding storage accounts created by Databricks)

Azure BuiltIn Policy definition

Source Azure Portal
Display name Storage accounts should use private link (excluding storage accounts created by Databricks)
Id 1604f626-4d8d-4124-8bb8-b1e5f95562de
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.0
Built-in Versioning [Preview]
Category Storage
Microsoft Learn
Description Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your storage account, data leakage risks are reduced. Learn more about private links at - https://aka.ms/azureprivatelinkoverview
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '1.*.*'
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
RBAC role(s) none
Rule aliases THEN-ExistenceCondition (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Storage/storageAccounts/privateEndpointConnections/privateLinkServiceConnectionState.status Microsoft.Storage storageAccounts/privateEndpointConnections properties.privateLinkServiceConnectionState.status True False
Rule resource types IF (1)
Compliance
The following 1 compliance controls are associated with this Policy definition 'Storage accounts should use private link (excluding storage accounts created by Databricks)' (1604f626-4d8d-4124-8bb8-b1e5f95562de)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 NS-2 Azure_Security_Benchmark_v3.0_NS-2 Microsoft cloud security benchmark NS-2 Network Security Secure cloud services with network controls Shared **Security Principle:** Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible. **Azure Guidance:** Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible. For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service. **Implementation and additional context:** Understand Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-overview n/a link 42
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn true
History
Date/Time (UTC ymd) (i) Change type Change detail
2025-03-03 18:38:02 add 1604f626-4d8d-4124-8bb8-b1e5f95562de
JSON compare n/a
JSON
api-version=2021-06-01
EPAC