Source |
Repository Community-Policy GitHub JSON Community-Policy GitHub |
||||||||||||||
Display name | Storage accounts should prevent allowed copy scope outside AAD tenant | ||||||||||||||
Id | 63dd3af3-11bb-4328-92d2-85ec87cbf923 | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Category | Storage Microsoft Learn |
||||||||||||||
Description | Audit restriction of copy operations for your storage account. By default, users can copy from source storage account in one Azure AD tenant and a destination account in a different tenant. It is a security concern because customer's data can be replicated to a storage account that is owned by the customer. By setting allowedCopyScope to AAD, copy operations can be done only if both source and destination accounts are in the same Azure AD tenant. | ||||||||||||||
Mode | All | ||||||||||||||
Type | Custom Community | ||||||||||||||
Effect | Default Audit Allowed Deny, Audit, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||
Rule resource types | IF (1) Microsoft.Storage/storageAccounts |
||||||||||||||
JSON |
|