Skip to content

Commit 2666269

Browse files
Merge pull request #233750 from asudbring/vnet-old-review-2
Review of Azure vnet service endpoint policies
2 parents 3695cd0 + 3163134 commit 2666269

File tree

1 file changed

+68
-34
lines changed

1 file changed

+68
-34
lines changed
Lines changed: 68 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,37 @@
11
---
22
title: Azure virtual network service endpoint policies
33
description: Learn how to filter Virtual Network traffic to Azure service resources using Service Endpoint Policies
4-
services: virtual-network
54
author: asudbring
65
ms.service: virtual-network
76
ms.topic: conceptual
8-
ms.workload: infrastructure-services
9-
ms.date: 02/21/2020
7+
ms.date: 04/06/2023
108
ms.author: allensu
119
---
1210

1311
# Virtual network service endpoint policies for Azure Storage
1412

15-
Virtual Network (VNet) service endpoint policies allow you to filter egress virtual network traffic to Azure Storage accounts over service endpoint, and allow data exfiltration to only specific Azure Storage accounts. Endpoint policies provide granular access control for virtual network traffic to Azure Storage when connecting over service endpoint.
13+
Virtual Network service endpoint policies allow you to filter egress virtual network traffic to Azure Storage accounts over service endpoint, and allow data exfiltration to only specific Azure Storage accounts. Endpoint policies provide granular access control for virtual network traffic to Azure Storage when connecting over service endpoint.
1614

17-
![Securing Virtual network outbound traffic to Azure Storage accounts](./media/virtual-network-service-endpoint-policies-overview/vnet-service-endpoint-policies-overview.png)
15+
:::image type="content" source="./media/virtual-network-service-endpoint-policies-overview/vnet-service-endpoint-policies-overview.png" alt-text="Diagram of Securing Virtual network outbound traffic to Azure Storage accounts.":::
1816

19-
This feature is generally available for __Azure Storage__ in __all global Azure regions__.
17+
This feature is generally available for **Azure Storage** in **all global Azure regions**.
2018

2119
## Key benefits
2220

2321
Virtual network service endpoint policies provide following benefits:
2422

25-
- __Improved security for your Virtual Network traffic to Azure Storage__
23+
- **Improved security for your Virtual Network traffic to Azure Storage**
2624

27-
[Azure service tags for network security groups](./network-security-groups-overview.md) allow you to restrict virtual network outbound traffic to specific Azure Storage regions. However, this allows traffic to any account within selected Azure Storage region.
25+
[Azure service tags for network security groups](./network-security-groups-overview.md) allow you to restrict virtual network outbound traffic to specific Azure Storage regions. However, this process allows traffic to any account within selected Azure Storage region.
2826

29-
Endpoint policies allow you to specify the Azure Storage accounts that are allowed virtual network outbound access and restricts access to all the other storage accounts. This gives much more granular security control for protecting data exfiltration from your virtual network.
27+
Endpoint policies allow you to specify the Azure Storage accounts that are allowed virtual network outbound access and restricts access to all the other storage accounts. This process gives much more granular security control for protecting data exfiltration from your virtual network.
3028

31-
- __Scalable, highly available policies to filter Azure service traffic__
29+
- **Scalable, highly available policies to filter Azure service traffic**
3230

33-
Endpoint policies provide horizontally scalable, highly available solution to filter Azure service traffic from virtual networks, over service endpoints. No additional overhead is required to maintain central network appliances for this traffic in your virtual networks.
31+
Endpoint policies provide horizontally scalable, highly available solution to filter Azure service traffic from virtual networks, over service endpoints. No extra overhead is required to maintain central network appliances for this traffic in your virtual networks.
3432

3533
## JSON Object for Service Endpoint policies
34+
3635
Let's take a quick look at the Service Endpoint Policy object.
3736

3837
```json
@@ -53,80 +52,114 @@ Let's take a quick look at the Service Endpoint Policy object.
5352
## Configuration
5453

5554
- You can configure the endpoint policies to restrict virtual network traffic to specific Azure Storage accounts.
55+
5656
- Endpoint policy is configured on a subnet in a virtual network. Service endpoints for Azure Storage should be enabled on the subnet to apply the policy.
57-
- Endpoint policy allows you to add specific Azure Storage accounts to allow list, using the resourceID format. You can restrict access to
58-
- all storage accounts in a subscription<br>
57+
58+
- Endpoint policy allows you to add specific Azure Storage accounts to allowlist, using the resourceID format. You can restrict access to:
59+
60+
- All storage accounts in a subscription<br>
5961
`E.g. /subscriptions/subscriptionId`
6062

61-
- all storage accounts in a resource group<br>
62-
`E.g. subscriptions/subscriptionId/resourceGroups/resourceGroupName`
63-
64-
- an individual storage account by listing the corresponding Azure Resource Manager resourceId. This covers traffic to blobs, tables, queues, files and Azure Data Lake Storage Gen2. <br>
65-
`E.g. /subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.Storage/storageAccounts/storageAccountName`
66-
- By default, if no policies are attached to a subnet with endpoints, you can access all storage accounts in the service. Once a policy is configured on that subnet, only the resources specified in the policy can be accessed from compute instances in that subnet. Access to all other storage accounts will be denied.
67-
- When applying Service Endpoint policies on a subnet, the Azure Storage *Service Endpoint scope* gets upgraded from regional to **global**. This means that all the traffic to Azure Storage is secured over service endpoint thereafter. The Service endpoint policies are also applicable globally, so any storage accounts, that are not explicitly allowed, will be denied access.
68-
- You can apply multiple policies to a subnet. When multiple policies are associated to the subnet, virtual network traffic to resources specified across any of these policies will be allowed. Access to all other service resources, not specified in any of the policies, will be denied.
63+
- All storage accounts in a resource group<br>
64+
`E.g. subscriptions/subscriptionId/resourceGroups/resourceGroupName`
65+
66+
- An individual storage account by listing the corresponding Azure Resource Manager resourceId. This covers traffic to blobs, tables, queues, files and Azure Data Lake Storage Gen2. <br>
67+
`E.g. /subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.Storage/storageAccounts/storageAccountName`
68+
69+
- By default, if no policies are attached to a subnet with endpoints, you can access all storage accounts in the service. Once a policy is configured on that subnet, only the resources specified in the policy can be accessed from compute instances in that subnet. Access to all other storage accounts is denied.
70+
71+
- When Service Endpoint policies are applied on a subnet, the Azure Storage *Service Endpoint scope* gets upgraded from regional to **global**. This process means that all the traffic to Azure Storage is secured over service endpoint thereafter. The Service endpoint policies are also applicable globally. Any storage accounts that aren't explicitly allowed are denied access.
72+
73+
- You can apply multiple policies to a subnet. When multiple policies are associated to the subnet, virtual network traffic to resources specified across any of these policies are allowed. Access to all other service resources, not specified in any of the policies, are denied.
74+
75+
> [!NOTE]
76+
> Service endpoint policies are **allow policies**, so apart from the specified resources, all other resources are restricted. Please ensure that all service resource dependencies for your applications are identified and listed in the policy.
77+
78+
- Only storage accounts using the Azure Resource Model can be specified in the endpoint policy. Classic Azure Storage accounts don't support Azure Service Endpoint Policies.
6979

70-
> [!NOTE]
71-
> Service endpoint policies are **allow policies**, so apart from the specified resources, all other resources are restricted. Please ensure that all service resource dependencies for your applications are identified and listed in the policy.
80+
- RA-GRS secondary access is automatically allowed if the primary account is listed.
7281

73-
- Only storage accounts using the Azure Resource Model can be specified in the endpoint policy. Your classic Azure Storage accounts will not support Azure Service Endpoint Policies.
74-
- RA-GRS secondary access will be automatically allowed if the primary account is listed.
7582
- Storage accounts can be in the same or a different subscription or Azure Active Directory tenant as the virtual network.
7683

7784
## Scenarios
7885

7986
- **Peered, connected or multiple virtual networks**: To filter traffic in peered virtual networks, endpoint policies should be applied individually to these virtual networks.
87+
8088
- **Filtering Internet traffic with Network Appliances or Azure Firewall**: Filter Azure service traffic with policies, over service endpoints, and filter rest of the Internet or Azure traffic via appliances or Azure Firewall.
81-
- **Filtering traffic on Azure services deployed into Virtual Networks**: At this time, Azure Service Endpoint Policies are not supported for any managed Azure services that are deployed into your virtual network.
89+
90+
- **Filtering traffic on Azure services deployed into Virtual Networks**: At this time, Azure Service Endpoint Policies aren't supported for any managed Azure services that are deployed into your virtual network.
91+
8292
- **Filtering traffic to Azure services from on-premises**:
8393
Service endpoint policies only apply to the traffic from subnets associated to the policies. To allow access to specific Azure service resources from on-premises, traffic should be filtered using network virtual appliances or firewalls.
8494

8595
## Logging and troubleshooting
96+
8697
No centralized logging is available for service endpoint policies. For service resource logs, see [Service endpoints logging](virtual-network-service-endpoints-overview.md#logging-and-troubleshooting).
8798

8899
### Troubleshooting scenarios
100+
89101
- Access denied to storage accounts that were working in preview (not in geo-paired region)
102+
90103
- With Azure Storage upgrading to use Global Service Tags, the scope of Service Endpoint and thus Service Endpoint policies is now Global. So any traffic to Azure Storage is encrypted over Service Endpoints and only Storage accounts that are explicitly listed in policy are allowed access.
91-
- Explicitly allow list all the required Storage accounts to restore access.
104+
105+
- Explicitly allowlist all the required Storage accounts to restore access.
106+
92107
- Contact Azure support.
108+
93109
- Access is denied for accounts listed in the endpoint policies
110+
94111
- Network security groups or firewall filtering could be blocking access
112+
95113
- If removing/re-applying the policy results in connectivity loss:
114+
96115
- Validate whether the Azure service is configured to allow access from the virtual network over endpoints, or that the default policy for the resource is set to *Allow All*.
116+
97117
- Validate that the service diagnostics show the traffic over endpoints.
118+
98119
- Check whether network security group flow logs show the access and that storage logs show the access, as expected, over service endpoints.
120+
99121
- Contact Azure support.
122+
100123
- Access is denied for accounts not listed in the service endpoint policies
124+
101125
- Validate whether Azure Storage is configured to allow access from the virtual network over endpoints, or whether the default policy for the resource is set to *Allow All*.
102-
- Ensure the accounts are not **classic storage accounts** with service endpoint policies on the subnet.
126+
127+
- Ensure the accounts aren't **classic storage accounts** with service endpoint policies on the subnet.
128+
103129
- A managed Azure Service stopped working after applying a Service Endpoint Policy over the subnet
104-
- Managed services other than Azure SQL Managed Instance are not currently supported with service endpoints.
130+
131+
- Managed services other than Azure SQL Managed Instance aren't currently supported with service endpoints.
132+
105133
- Access to Managed Storage Accounts stopped working after applying a Service Endpoint Policy over the subnet
106-
- Managed Storage Accounts are not supported with service endpoint policies. If configured, policies will deny access to all Managed Storage Accounts, by default. If your application needs access to Managed Storage Accounts, endpoint policies should not be used for this traffic.
134+
135+
- Managed Storage Accounts aren't supported with service endpoint policies. If configured, policies deny access to all Managed Storage Accounts, by default. If your application needs access to Managed Storage Accounts, endpoint policies shouldn't be used for this traffic.
107136

108137
## Provisioning
109138

110-
Service endpoint policies can be configured on subnets by a user with write access to a virtual network. Learn more about Azure [built-in roles](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json) and assigning specific permissions to [custom roles](../role-based-access-control/custom-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json).
139+
A user with write access to a virtual network configures service endpoint policies on subnets. Learn more about Azure [built-in roles](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json) and assigning specific permissions to [custom roles](../role-based-access-control/custom-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json).
111140

112141
Virtual networks and Azure Storage accounts can be in the same or different subscriptions, or Azure Active Directory tenants.
113142

114143
## Limitations
115144

116145
- You can only deploy service endpoint policies on virtual networks deployed through the Azure Resource Manager deployment model.
146+
117147
- Virtual networks must be in the same region as the service endpoint policy.
148+
118149
- You can only apply service endpoint policy on a subnet if service endpoints are configured for the Azure services listed in the policy.
150+
119151
- You can't use service endpoint policies for traffic from your on-premises network to Azure services.
120-
- Azure managed services other than Azure SQL Managed Instance do not currently support endpoint policies. This includes managed services deployed into shared subnets (such as *Azure Batch, Azure ADDS, Azure Application Gateway, Azure VPN Gateway, Azure Firewall*) or into dedicated subnets (such as *Azure App Service Environment, Azure Redis Cache, Azure API Management, classic managed services*).
152+
153+
- Azure managed services other than Azure SQL Managed Instance don't currently support endpoint policies. This limitation includes managed services deployed into shared subnets (such as *Azure Batch, Azure AD DS, Azure Application Gateway, Azure VPN Gateway, Azure Firewall*) or into dedicated subnets (such as *Azure App Service Environment, Azure Redis Cache, Azure API Management, classic managed services*).
121154

122155
> [!WARNING]
123156
> Azure services deployed into your virtual network, such as Azure HDInsight, access other Azure services, such as Azure Storage, for infrastructure requirements. Restricting endpoint policy to specific resources could break access to these infrastructure resources for the Azure services deployed in your virtual network.
124157
125-
- Classic storage accounts are not supported in endpoint policies. Policies will deny access to all classic storage accounts, by default. If your application needs access to Azure Resource Manager and classic storage accounts, endpoint policies should not be used for this traffic.
158+
- Classic storage accounts aren't supported in endpoint policies. Policies deny access to all classic storage accounts, by default. If your application needs access to Azure Resource Manager and classic storage accounts, endpoint policies shouldn't be used for this traffic.
126159

127160
## Pricing and limits
128161

129-
There is no additional charge for using service endpoint policies. The current pricing model for Azure services (such as, Azure Storage) applies as is today, over service endpoints.
162+
There's no extra charge for using service endpoint policies. The current pricing model for Azure services (such as, Azure Storage) applies as is today, over service endpoints.
130163

131164
Following limits are enforced on service endpoint policies:
132165

@@ -140,4 +173,5 @@ Following limits are enforced on service endpoint policies:
140173
## Next Steps
141174

142175
- Learn [how to configure virtual network service endpoint policies](virtual-network-service-endpoint-policies-portal.md)
176+
143177
- Learn more about [Virtual network Service Endpoints](virtual-network-service-endpoints-overview.md)

0 commit comments

Comments
 (0)