| Source | 
                         Repository Azure Landing Zones (ALZ) GitHub  JSON Deny-Storage-ResourceAccessRulesResourceId  | 
                ||||||||||||||
| Display name | Resource Access Rules resource IDs should be restricted for Storage Accounts | ||||||||||||||
| Id | Deny-Storage-ResourceAccessRulesResourceId | ||||||||||||||
| Version | 1.0.0 Details on versioning  | 
                ||||||||||||||
| Category | Storage | ||||||||||||||
| Description | Azure Storage accounts should restrict the resource access rule for service-level network ACLs to services from a specific Azure subscription. Enforce this for increased data exfiltration protection. | ||||||||||||||
| Cloud environments | AzureChinaCloud AzureCloud AzureUSGovernment  | 
                ||||||||||||||
| Mode | All | ||||||||||||||
| Type | Custom Azure Landing Zones (ALZ) | ||||||||||||||
| Preview | False | ||||||||||||||
| Deprecated | False | ||||||||||||||
| Effect |                     Default Deny Allowed Audit, Deny, Disabled  | 
                ||||||||||||||
| RBAC role(s) | none | ||||||||||||||
| Rule aliases |                 IF (1)
  | 
                ||||||||||||||
| Rule resource types |                 IF (1) Microsoft.Storage/storageAccounts  | 
                ||||||||||||||
| Initiatives usage |                         
  | 
                ||||||||||||||
| History |                         
  | 
                ||||||||||||||
| JSON compare | n/a | ||||||||||||||
| JSON | 
                        
  |