Ensure that public network access (i.e., all network access) to Microsoft Azure Storage accounts is disabled in order to enhance security by preventing unauthorized access. Since Azure Storage accounts are initially configured to accept connections from all networks, applying network restrictions is essential for improved security and compliance.
When an Microsoft Azure Storage account is open to public access, it can be reached by all hosts and networks, including the Internet. This raises the likelihood of unauthorized access, security breaches, and potential compliance violations. However, if public network access is disabled, the public endpoint for your Storage account will be restricted, allowing access only through private endpoint connections.
Making changes to network rules can impact your applications' ability to connect to the Azure Storage account. Make sure to grant access to any allowed networks using network rules or IP ranges using firewalls before you change the default rule in order to deny access.
Audit
To determine whether public network access to your Azure Storage accounts is disabled, perform the following operations:
Remediation / Resolution
To disable public network access to your Azure virtual machine (VM) disks, perform the following operations:
References
- Azure Official Documentation
- Security recommendations for Blob storage
- Azure security baseline for Storage
- Security Control v3: Network security
- Use private endpoints for Azure Storage
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az storage account list
- az storage account show
- az storage account update