Skip to content

Commit 0c159e9

Browse files
author
Michael Bender
committed
added storage changes
1 parent fc32c80 commit 0c159e9

File tree

1 file changed

+21
-1
lines changed

1 file changed

+21
-1
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66
ms.service: azure-storage
77
ms.subservice: storage-common-concepts
88
ms.topic: how-to
9-
ms.date: 05/09/2024
9+
ms.date: 10/31/2024
1010
ms.author: normesta
1111
ms.reviewer: santoshc
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli, build-2023, engagement
@@ -86,6 +86,26 @@ To secure your storage account and build a secure network boundary for your appl
8686

8787
After you apply network rules, they're enforced for all requests. SAS tokens that grant access to a specific IP address serve to limit the access of the token holder, but they don't grant new access beyond configured network rules.
8888

89+
### Network Security Perimeter (preview)
90+
91+
[Network Security Perimeter (NSP)](../../private-link/network-security-perimeter-concepts.md) allows administrators to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and SQL Database) that are deployed outside virtual networks. It restricts communication to resources within the perimeter, and it allows non-perimeter public traffic through inbound and outbound access rules. By design, access to a storage account from a network security perimeter takes the highest precedence over other network access restrictions. Currently this service is in public preview for Azure Blobs, Files (SMB only), Tables, and Queues.
92+
93+
#### Limitations
94+
95+
This preview doesn't support the following services, operations, and protocols:
96+
97+
- [Object replication](../blobs/object-replication-overview.md) (block blobs)
98+
- [Lifecycle management](../blobs/lifecycle-management-overview.md)
99+
- File transfer protocol (FTP)
100+
- Network file system (NFS)
101+
102+
We recommend you don't enable NSP if you need to use any of these services, operations, or protocols. This is to prevent any potential data loss or data exfiltration risk.
103+
104+
Azure Storage only supports outbound communication to Azure Key Vault for scenarios involving customer managed keys (CMK). It doesn't currently support any other outbound scenarios with NSP.
105+
106+
> [!WARNING]
107+
> If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#grant-access-from-azure-resource-instances) and [exceptions](#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
108+
89109
## Restrictions and considerations
90110

91111
Before implementing network security for your storage accounts, review the important restrictions and considerations discussed in this section.

0 commit comments

Comments
 (0)