Other Articles

Storage Account – Enforce Private Endpoint Access

This check ensures that Azure Storage Accounts are accessible only through private endpoints within a virtual network. Enforcing private endpoint access prevents exposure of storage services over the public internet and enhances network-level security.

Check Details

  • Resource: Storage Account
  • Check: Enforce Private Endpoint Access
  • Risk: If public network access is enabled, storage accounts may be reachable from the internet, increasing the risk of unauthorized access and data exfiltration.

Remediation via Azure Portal

  1. Log in to the Azure Portal. Azure Portal Home
  2. Navigate to Storage Accounts and select the target storage account. Azure Storage Accounts list
  3. From the left menu, go to Networking under Security + networking. Storage account encryption menu
  4. Under Public network access, select Disabled.
  5. Scroll to Private endpoints and click + Create private endpoint. Add private endpoint
  6. Complete the private endpoint creation by providing instance details: Add private endpoint
  7. Click Save to apply the changes.

Remediation via Azure CLI

  1. Open Azure Cloud Shell. Azure Cloud Shell
  2. Disable public network access for the storage account:
    az storage account update \
     --name <storage-account-name> \
     --resource-group <resource-group-name> \
     --public-network-access Disabled
    
  3. Create a private endpoint for the storage account:
    az network private-endpoint create \
     --name <private-endpoint-name> \
     --resource-group <resource-group-name> \
     --vnet-name <vnet-name> \
     --subnet <subnet-name> \
     --private-connection-resource-id <storage-account-resource-id> \
     --group-id blob \
     --connection-name storagePrivateConnection
    

These steps ensure that the storage account is accessible only through private endpoints within a trusted virtual network, preventing exposure to the public internet.