last sync: 2025-Jul-30 17:47:15 UTC

Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)

Azure BuiltIn Policy definition

Source Azure Portal
Display name Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)
Id db4f9b05-5ffd-4b34-b714-3c710dbb3fd6
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.0
Built-in Versioning [Preview]
Category Storage
Microsoft Learn
Description Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts.
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '1.*.*'
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Storage/storageAccounts/networkAcls.defaultAction Microsoft.Storage storageAccounts properties.networkAcls.defaultAction True True
Microsoft.Storage/storageAccounts/networkAcls.ipRules[*] Microsoft.Storage storageAccounts properties.networkAcls.ipRules[*] True True
Rule resource types IF (1)
Compliance
The following 1 compliance controls are associated with this Policy definition 'Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)' (db4f9b05-5ffd-4b34-b714-3c710dbb3fd6)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Azure_Security_Benchmark_v3.0 NS-2 Azure_Security_Benchmark_v3.0_NS-2 Microsoft cloud security benchmark NS-2 Network Security Secure cloud services with network controls Shared **Security Principle:** Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible. **Azure Guidance:** Deploy private endpoints for all Azure resources that support the Private Link feature, to establish a private access point for the resources. You should also disable or restrict public network access to services where feasible. For certain services, you also have the option to deploy VNet integration for the service where you can restrict the VNET to establish a private access point for the service. **Implementation and additional context:** Understand Azure Private Link: https://docs.microsoft.com/azure/private-link/private-link-overview n/a link 42
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
Microsoft cloud security benchmark 1f3afdf9-d0c9-4c3d-847f-89da613e70a8 Security Center GA BuiltIn true
History
Date/Time (UTC ymd) (i) Change type Change detail
2025-03-03 18:38:02 add db4f9b05-5ffd-4b34-b714-3c710dbb3fd6
JSON compare n/a
JSON
api-version=2021-06-01
EPAC