last sync: 2025-Apr-29 17:16:02 UTC

Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)

Azure BuiltIn Policy definition

Source Azure Portal
Display name Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)
Id db4f9b05-5ffd-4b34-b714-3c710dbb3fd6
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
1.0.0
Built-in Versioning [Preview]
Category Storage
Microsoft Learn
Description Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts.
Cloud environments AzureCloud = true
AzureUSGovernment = unknown
AzureChinaCloud = unknown
Available in AzUSGov Unknown, no evidence if Policy definition is/not available in AzureUSGovernment
Assessment(s) Assessments count: 1
Assessment Id: 5c06c2a2-aa48-42ff-b18d-1a9cb36fccd9
DisplayName: Storage accounts should restrict network access using virtual network rules
Description: This method is preferred over IP-based filtering, which can leave your storage accounts vulnerable to threats if public IPs gain access.
If IP-based filtering is not disabled, your storage accounts could be exposed to potential threats, compromising the security of your data.

Remediation description: To protect your storage account from potential threats using virtual network rules: 1. In the Azure portal, open your storage account. 2. From the left sidebar, select 'Networking'. 3. From the 'Allow access from' section, select 'Selected networks'. 4. Add a Virtual network under the 'Virtual networks' section. Do not add allowed IP ranges/ or addresses in the firewall. This is to prevent public IPs from accessing your storage account. For details, see: https://aka.ms/storagenetworksecurity.
Categories: Data
Severity: Medium
preview: True
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Storage/storageAccounts/networkAcls.defaultAction Microsoft.Storage storageAccounts properties.networkAcls.defaultAction True True
Microsoft.Storage/storageAccounts/networkAcls.ipRules[*] Microsoft.Storage storageAccounts properties.networkAcls.ipRules[*] True True
Rule resource types IF (1)
Compliance Not a Compliance control
Initiatives usage none
History
Date/Time (UTC ymd) (i) Change type Change detail
2025-03-03 18:38:02 add db4f9b05-5ffd-4b34-b714-3c710dbb3fd6
JSON compare n/a
JSON
api-version=2021-06-01
EPAC