Private Endpoints Are Not Used for Storage Accounts
Overview
Use private endpoints for your Azure Storage accounts to allow clients and services to securely access data located over a network via an encrypted Private Link. To do this, the private endpoint uses an IP address from the VNet for each service. Network traffic between disparate services securely traverses encrypted over the VNet. This VNet can also link addressing space, extending your network and accessing resources on it. Similarly, it can be a tunnel through public networks to connect remote infrastructures together. This creates further security through segmenting network traffic and preventing outside sources from accessing it.
Securing traffic between services through encryption protects the data from easy interception and reading. There is no cost in deploying VNets between Azure resources. If improperly implemented, it may result in loss of critical network traffic.
Vendor
Azure
Cloud Service
Storage
Related Controls
CIS Azure v2.0.0 3.10
References
https://docs.microsoft.com/en-us/azure/storage/common/storage-private-endpoints, https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-overview, https://docs.microsoft.com/en-us/azure/private-link/create-private-endpoint-cli?tabs=dynamic-ip, https://docs.microsoft.com/en-us/azure/private-link/create-private-endpoint-powershell?tabs=dynamic-ip, https://docs.microsoft.com/en-us/azure/private-link/tutorial-private-endpoint-storage-portal, https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-network-security#ns-2-secure-cloud-services-with-network-controls
Severity
3
Item Types
Microsoft.Storage.storageAccounts