| Source | Repository Azure Landing Zones (ALZ) GitHub JSON Deny-Storage-NetworkAclsBypass | ||||||||||||||
| Display name | Network ACL bypass option should be restricted for Storage Accounts | ||||||||||||||
| Id | Deny-Storage-NetworkAclsBypass | ||||||||||||||
| Version | 1.0.0 Details on versioning | ||||||||||||||
| Category | Storage | ||||||||||||||
| Description | Azure Storage accounts should restrict the bypass option for service-level network ACLs. Enforce this for increased data exfiltration protection. | ||||||||||||||
| Cloud environments | AzureChinaCloud AzureCloud AzureUSGovernment | ||||||||||||||
| Mode | All | ||||||||||||||
| Type | Custom Azure Landing Zones (ALZ) | ||||||||||||||
| Preview | False | ||||||||||||||
| Deprecated | False | ||||||||||||||
| Effect | Default Deny Allowed Audit, Deny, Disabled | ||||||||||||||
| RBAC role(s) | none | ||||||||||||||
| Rule aliases | IF (1) 
 | ||||||||||||||
| Rule resource types | IF (1) Microsoft.Storage/storageAccounts | ||||||||||||||
| Initiatives usage | 
 | ||||||||||||||
| History | 
 | ||||||||||||||
| JSON compare | n/a | ||||||||||||||
| JSON | 
 |