Source | Azure Portal | ||||||||||||||
Display name | Storage accounts should use private link (excluding storage accounts created by Databricks) | ||||||||||||||
Id | 1604f626-4d8d-4124-8bb8-b1e5f95562de | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
Category | Storage Microsoft Learn |
||||||||||||||
Description | Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your storage account, data leakage risks are reduced. Learn more about private links at - https://aka.ms/azureprivatelinkoverview | ||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: b6ea359b-7334-434a-b898-23fd4e04a644 DisplayName: Storage account should use a private link connection Description: Private links in a storage account are important for enforcing secure communication. They provide private connectivity to the storage account, ensuring that data is securely transmitted and protected from potential threats. If a private link connection is not used, the storage account may be exposed to risks such as data breaches or unauthorized access. Remediation description: To enforce secure communications for your storage accounts, add a private endpoint as described here: https://aka.ms/connectprivatelytostorageaccount. Categories: Data Severity: Medium preview: True |
||||||||||||||
Mode | Indexed | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | THEN-ExistenceCondition (1)
|
||||||||||||||
Rule resource types | IF (1) |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage | none | ||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|