Name | Storage accounts should allow access from trusted Microsoft services Azure Portal |
|||||||||||||||||||||||||
Id | c9d007d0-c057-4772-b18c-01e546713bcd | |||||||||||||||||||||||||
Version | 1.0.0 details on versioning |
|||||||||||||||||||||||||
Category | Storage Microsoft docs |
|||||||||||||||||||||||||
Description | Some Microsoft services that interact with storage accounts operate from networks that can't be granted access through network rules. To help this type of service work as intended, allow the set of trusted Microsoft services to bypass the network rules. These services will then use strong authentication to access the storage account. | |||||||||||||||||||||||||
Mode | Indexed | |||||||||||||||||||||||||
Type | BuiltIn | |||||||||||||||||||||||||
Preview | FALSE | |||||||||||||||||||||||||
Deprecated | FALSE | |||||||||||||||||||||||||
Effect | Default: Audit Allowed: (Audit, Deny, Disabled) |
|||||||||||||||||||||||||
Used RBAC Role | none | |||||||||||||||||||||||||
Rule Aliases | IF (1)
|
|||||||||||||||||||||||||
Rule ResourceTypes | IF (1) Microsoft.Storage/storageAccounts |
|||||||||||||||||||||||||
History | none | |||||||||||||||||||||||||
Used in Initiatives |
|
|||||||||||||||||||||||||
JSON |
|