Skip to content

Thiago Beier🍁

Azure, M365 (EMS)

  • Home
  • Study Guide
  • I recommend
  • About

Azure – Securing storage accounts

Thiago Beier Azure, Tips, Troubleshooting May 29, 2020May 24, 2020 1 Minute

Hi there

Did you know that Storage accounts on Azure come with Firewall disabled by default allowing external access (any to storageaccountname)? Before you ask me, that doesn’t happen with AWS.

What about to fix 100 storage accounts by hand. Powershell can assist you on that.

If you’re running Azure Storage accounts on Production, UAT or DEV keep an eye on it.

Go to your Azure Portal

Search for Storage accounts on Home \ All services if that’s not pinned already.

Go on each storage account and click on Firewalls and virtual networks under settings

You should see “allow access from” set to All networks (default option)

Fixing manually

Change to selected networks

Explore the following options:

  • + Add existing virtual network
    • select from the list all VNETS that you need to associate to this storage account allowing access to it
  • + Add new virtual network
    • add / create a new VNET that you’ll associate to this storage account allowing access to it
  • Firewall
    • Add IP ranges to allow access from the internet or your on-premises networks.  (if you need to lock this down to an Internet IP address – your home ip address for example) TIP: it always detect your current internet ip address – check yours at IPChicken

Fixing using powershell

Coming soon.

I’m still working on a script to do this by subscription, resource groups and its associated VNETs. Client’s production, uat or dev environments after deployed it will have a high complexity around naming convention for azure resources as well as for the required ones for this task: VNETs, subnets and storage accounts names.

Checking usign AZ CLI

Reference

https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security
https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security#grant-access-from-an-internet-ip-range

Thanks,

Thiago Beier
TwitterLinkedInFacebookRSS

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to print (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Like this:

Like Loading...

Related

  • Tagged
  • Azure
  • azure powershell
  • azure resources
  • firewall
  • Powershell
  • Security
  • storage account

Published by Thiago Beier

IT Solutions Architect View all posts by Thiago Beier

Published May 29, 2020May 24, 2020

Post navigation

Previous Post Teams – Live Events demo.
Next Post Azure – RI (Reserved Instance)

Archives

  • June 2023 (1)
  • May 2023 (6)
  • April 2023 (8)
  • March 2023 (11)
  • March 2021 (3)
  • February 2021 (2)
  • January 2021 (2)
  • December 2020 (7)
  • September 2020 (4)
  • August 2020 (10)
  • July 2020 (5)
  • June 2020 (13)
  • May 2020 (23)
  • April 2020 (21)
  • March 2020 (17)
  • February 2020 (6)
  • February 2017 (2)
  • April 2016 (6)
  • August 2013 (3)
  • May 2013 (2)
  • September 2012 (2)

Follow me on Twitter

My Tweets

Follow Me

Twitter LinkedIn Facebook RSS

Blog Stats

  • 65,347 hits

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,286 other subscribers

Copyright © 2023 Thiago Beier Blog

Posts in this blog are provided “AS IS” with no warranties, and confers no rights.

Blog at WordPress.com.
  • Follow Following
    • Thiago Beier🍁
    • Already have a WordPress.com account? Log in now.
    • Thiago Beier🍁
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: