Intelligent Assessment: Natural language Guardrails powered by AI →
Mods
Azure

Policy: Azure > CIS v3.0 > 04 - Storage Accounts > 04.06 - Ensure that 'Public Network Access' is 'Disabled' for storage accounts

Configures auditing against a CIS Benchmark item.

Level: 1

Disallowing public network access for a storage account overrides the public access settings for individual containers in that storage account for Azure Resource Manager Deployment Model storage accounts. Azure Storage accounts that use the classic deployment model will be retired on August 31, 2024.

The default network configuration for a storage account permits a user with appropriate permissions to configure public network access to containers and blobs in a storage account. Keep in mind that public access to a container is always turned off by default and must be explicitly configured to permit anonymous requests. It grants read-only access to these resources without sharing the account key, and without requiring a shared access signature. It is recommended not to provide public network access to storage accounts until, and unless, it is strongly desired. A shared access signature token or Azure AD RBAC should be used for providing controlled and timed access to blob containers.

Targets

This policy targets the following resource types:

Primary Policy

This policy is used with the following primary policy:

Policy Specification

Schema Type
string
Default
Per Azure > CIS v3.0 > 04 - Storage Accounts
Valid Values [YAML]
  • Per Azure > CIS v3.0 > 04 - Storage Accounts
    
  • Skip
    
  • Check: Benchmark
    

Category

In Your Workspace

Developers