Source | Azure Portal | |||||||||||||||||||||
Display name | Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks) | |||||||||||||||||||||
Id | db4f9b05-5ffd-4b34-b714-3c710dbb3fd6 | |||||||||||||||||||||
Version | 1.0.0 Details on versioning |
|||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
|||||||||||||||||||||
Category | Storage Microsoft Learn |
|||||||||||||||||||||
Description | Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts. | |||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
|||||||||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | |||||||||||||||||||||
Assessment(s) |
Assessments count: 1 Assessment Id: 5c06c2a2-aa48-42ff-b18d-1a9cb36fccd9 DisplayName: Storage accounts should restrict network access using virtual network rules Description: This method is preferred over IP-based filtering, which can leave your storage accounts vulnerable to threats if public IPs gain access. If IP-based filtering is not disabled, your storage accounts could be exposed to potential threats, compromising the security of your data. Remediation description: To protect your storage account from potential threats using virtual network rules: 1. In the Azure portal, open your storage account. 2. From the left sidebar, select 'Networking'. 3. From the 'Allow access from' section, select 'Selected networks'. 4. Add a Virtual network under the 'Virtual networks' section. Do not add allowed IP ranges/ or addresses in the firewall. This is to prevent public IPs from accessing your storage account. For details, see: https://aka.ms/storagenetworksecurity. Categories: Data Severity: Medium preview: True |
|||||||||||||||||||||
Mode | Indexed | |||||||||||||||||||||
Type | BuiltIn | |||||||||||||||||||||
Preview | False | |||||||||||||||||||||
Deprecated | False | |||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
|||||||||||||||||||||
RBAC role(s) | none | |||||||||||||||||||||
Rule aliases | IF (2)
|
|||||||||||||||||||||
Rule resource types | IF (1) |
|||||||||||||||||||||
Compliance | Not a Compliance control | |||||||||||||||||||||
Initiatives usage | none | |||||||||||||||||||||
History |
|
|||||||||||||||||||||
JSON compare | n/a | |||||||||||||||||||||
JSON |
|