The default network access rule for Storage Accounts should be set to deny
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Description
Configure storage accounts to deny access to traffic from all networks (including internet traffic). Grant access to traffic from specific Azure Virtual networks, allowing a secure network boundary for specific applications to be built. Access can also be granted to public internet IP address ranges, to enable connections from specific internet or on-premises clients. When network rules are configured, only applications from allowed networks can access a storage account. When calling from an allowed network, applications continue to require proper authorization (a valid access key or SAS token) to access the storage account.
From the console
- Go to Storage Accounts.
- For each storage account, click on the Networking blade.
- Click the Firewalls and virtual networks heading.
- Ensure that you have elected to allow access from Selected networks.
- Add rules to allow traffic from specific networks and click Save to apply your changes.