Ensure that your Microsoft Azure Storage accounts are configured to deny access to traffic from all networks (including Internet traffic). By restricting default network access to your Storage accounts, you add a new layer of security, since the default action is to accept connections from clients on any network. To limit access to selected networks or IP addresses, you must first change the default action from "Allow" to "Deny".
The access to your Azure Storage accounts should be granted to specific Virtual Networks (VNets), which allows a secure network boundary for specific applications, or to public IP address ranges, which can enable connections from specific Internet services or on-premises clients. When network rules are configured, only applications from allowed networks or IPs can access your storage resources. When requesting access from an allowed network and/or IP address, a client/application should provide proper authorization, i.e., a valid access key or a Shared Access Signatures (SAS) token, to access your Storage account.
Making changes to the network rules can impact your applications' ability to connect to the Azure Storage account. Make sure to grant access to any allowed networks using network rules or IP ranges using firewalls, before you change the default rule in order to deny access.
Audit
To determine if the default network access is restricted for your Azure Storage accounts, perform the following operations:
Remediation / Resolution
To restrict default network access to your Microsoft Azure Storage accounts, perform the following operations:
References
- Azure Official Documentation
- Configure Azure Storage firewalls and virtual networks
- Security Control v3: Network security
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az storage account list
- az storage account show
- az storage account update
- az storage account network-rule add