You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Azure virtual network service endpoint policies
3
3
description: Learn how to filter Virtual Network traffic to Azure service resources using Service Endpoint Policies
4
-
services: virtual-network
5
4
author: asudbring
6
5
ms.service: virtual-network
7
6
ms.topic: conceptual
8
-
ms.workload: infrastructure-services
9
-
ms.date: 02/21/2020
7
+
ms.date: 04/06/2023
10
8
ms.author: allensu
11
9
---
12
10
13
11
# Virtual network service endpoint policies for Azure Storage
14
12
15
-
Virtual Network (VNet) service endpoint policies allow you to filter egress virtual network traffic to Azure Storage accounts over service endpoint, and allow data exfiltration to only specific Azure Storage accounts. Endpoint policies provide granular access control for virtual network traffic to Azure Storage when connecting over service endpoint.
13
+
Virtual Network service endpoint policies allow you to filter egress virtual network traffic to Azure Storage accounts over service endpoint, and allow data exfiltration to only specific Azure Storage accounts. Endpoint policies provide granular access control for virtual network traffic to Azure Storage when connecting over service endpoint.
16
14
17
-

15
+
:::image type="content" source="./media/virtual-network-service-endpoint-policies-overview/vnet-service-endpoint-policies-overview.png" alt-text="Diagram of Securing Virtual network outbound traffic to Azure Storage accounts.":::
18
16
19
-
This feature is generally available for __Azure Storage__ in __all global Azure regions__.
17
+
This feature is generally available for **Azure Storage** in **all global Azure regions**.
20
18
21
19
## Key benefits
22
20
23
21
Virtual network service endpoint policies provide following benefits:
24
22
25
-
-__Improved security for your Virtual Network traffic to Azure Storage__
23
+
-**Improved security for your Virtual Network traffic to Azure Storage**
26
24
27
-
[Azure service tags for network security groups](./network-security-groups-overview.md) allow you to restrict virtual network outbound traffic to specific Azure Storage regions. However, this allows traffic to any account within selected Azure Storage region.
25
+
[Azure service tags for network security groups](./network-security-groups-overview.md) allow you to restrict virtual network outbound traffic to specific Azure Storage regions. However, this process allows traffic to any account within selected Azure Storage region.
28
26
29
-
Endpoint policies allow you to specify the Azure Storage accounts that are allowed virtual network outbound access and restricts access to all the other storage accounts. This gives much more granular security control for protecting data exfiltration from your virtual network.
27
+
Endpoint policies allow you to specify the Azure Storage accounts that are allowed virtual network outbound access and restricts access to all the other storage accounts. This process gives much more granular security control for protecting data exfiltration from your virtual network.
30
28
31
-
-__Scalable, highly available policies to filter Azure service traffic__
29
+
-**Scalable, highly available policies to filter Azure service traffic**
32
30
33
-
Endpoint policies provide horizontally scalable, highly available solution to filter Azure service traffic from virtual networks, over service endpoints. No additional overhead is required to maintain central network appliances for this traffic in your virtual networks.
31
+
Endpoint policies provide horizontally scalable, highly available solution to filter Azure service traffic from virtual networks, over service endpoints. No extra overhead is required to maintain central network appliances for this traffic in your virtual networks.
34
32
35
33
## JSON Object for Service Endpoint policies
34
+
36
35
Let's take a quick look at the Service Endpoint Policy object.
37
36
38
37
```json
@@ -53,80 +52,114 @@ Let's take a quick look at the Service Endpoint Policy object.
53
52
## Configuration
54
53
55
54
- You can configure the endpoint policies to restrict virtual network traffic to specific Azure Storage accounts.
55
+
56
56
- Endpoint policy is configured on a subnet in a virtual network. Service endpoints for Azure Storage should be enabled on the subnet to apply the policy.
57
-
- Endpoint policy allows you to add specific Azure Storage accounts to allow list, using the resourceID format. You can restrict access to
58
-
- all storage accounts in a subscription<br>
57
+
58
+
- Endpoint policy allows you to add specific Azure Storage accounts to allowlist, using the resourceID format. You can restrict access to:
- an individual storage account by listing the corresponding Azure Resource Manager resourceId. This covers traffic to blobs, tables, queues, files and Azure Data Lake Storage Gen2. <br>
- By default, if no policies are attached to a subnet with endpoints, you can access all storage accounts in the service. Once a policy is configured on that subnet, only the resources specified in the policy can be accessed from compute instances in that subnet. Access to all other storage accounts will be denied.
67
-
- When applying Service Endpoint policies on a subnet, the Azure Storage *Service Endpoint scope* gets upgraded from regional to **global**. This means that all the traffic to Azure Storage is secured over service endpoint thereafter. The Service endpoint policies are also applicable globally, so any storage accounts, that are not explicitly allowed, will be denied access.
68
-
- You can apply multiple policies to a subnet. When multiple policies are associated to the subnet, virtual network traffic to resources specified across any of these policies will be allowed. Access to all other service resources, not specified in any of the policies, will be denied.
- An individual storage account by listing the corresponding Azure Resource Manager resourceId. This covers traffic to blobs, tables, queues, files and Azure Data Lake Storage Gen2. <br>
- By default, if no policies are attached to a subnet with endpoints, you can access all storage accounts in the service. Once a policy is configured on that subnet, only the resources specified in the policy can be accessed from compute instances in that subnet. Access to all other storage accounts is denied.
70
+
71
+
- When Service Endpoint policies are applied on a subnet, the Azure Storage *Service Endpoint scope* gets upgraded from regional to **global**. This process means that all the traffic to Azure Storage is secured over service endpoint thereafter. The Service endpoint policies are also applicable globally. Any storage accounts that aren't explicitly allowed are denied access.
72
+
73
+
- You can apply multiple policies to a subnet. When multiple policies are associated to the subnet, virtual network traffic to resources specified across any of these policies are allowed. Access to all other service resources, not specified in any of the policies, are denied.
74
+
75
+
> [!NOTE]
76
+
> Service endpoint policies are **allow policies**, so apart from the specified resources, all other resources are restricted. Please ensure that all service resource dependencies for your applications are identified and listed in the policy.
77
+
78
+
- Only storage accounts using the Azure Resource Model can be specified in the endpoint policy. Classic Azure Storage accounts don't support Azure Service Endpoint Policies.
69
79
70
-
> [!NOTE]
71
-
> Service endpoint policies are **allow policies**, so apart from the specified resources, all other resources are restricted. Please ensure that all service resource dependencies for your applications are identified and listed in the policy.
80
+
- RA-GRS secondary access is automatically allowed if the primary account is listed.
72
81
73
-
- Only storage accounts using the Azure Resource Model can be specified in the endpoint policy. Your classic Azure Storage accounts will not support Azure Service Endpoint Policies.
74
-
- RA-GRS secondary access will be automatically allowed if the primary account is listed.
75
82
- Storage accounts can be in the same or a different subscription or Azure Active Directory tenant as the virtual network.
76
83
77
84
## Scenarios
78
85
79
86
-**Peered, connected or multiple virtual networks**: To filter traffic in peered virtual networks, endpoint policies should be applied individually to these virtual networks.
87
+
80
88
-**Filtering Internet traffic with Network Appliances or Azure Firewall**: Filter Azure service traffic with policies, over service endpoints, and filter rest of the Internet or Azure traffic via appliances or Azure Firewall.
81
-
-**Filtering traffic on Azure services deployed into Virtual Networks**: At this time, Azure Service Endpoint Policies are not supported for any managed Azure services that are deployed into your virtual network.
89
+
90
+
-**Filtering traffic on Azure services deployed into Virtual Networks**: At this time, Azure Service Endpoint Policies aren't supported for any managed Azure services that are deployed into your virtual network.
91
+
82
92
-**Filtering traffic to Azure services from on-premises**:
83
93
Service endpoint policies only apply to the traffic from subnets associated to the policies. To allow access to specific Azure service resources from on-premises, traffic should be filtered using network virtual appliances or firewalls.
84
94
85
95
## Logging and troubleshooting
96
+
86
97
No centralized logging is available for service endpoint policies. For service resource logs, see [Service endpoints logging](virtual-network-service-endpoints-overview.md#logging-and-troubleshooting).
87
98
88
99
### Troubleshooting scenarios
100
+
89
101
- Access denied to storage accounts that were working in preview (not in geo-paired region)
102
+
90
103
- With Azure Storage upgrading to use Global Service Tags, the scope of Service Endpoint and thus Service Endpoint policies is now Global. So any traffic to Azure Storage is encrypted over Service Endpoints and only Storage accounts that are explicitly listed in policy are allowed access.
91
-
- Explicitly allow list all the required Storage accounts to restore access.
104
+
105
+
- Explicitly allowlist all the required Storage accounts to restore access.
106
+
92
107
- Contact Azure support.
108
+
93
109
- Access is denied for accounts listed in the endpoint policies
110
+
94
111
- Network security groups or firewall filtering could be blocking access
112
+
95
113
- If removing/re-applying the policy results in connectivity loss:
114
+
96
115
- Validate whether the Azure service is configured to allow access from the virtual network over endpoints, or that the default policy for the resource is set to *Allow All*.
116
+
97
117
- Validate that the service diagnostics show the traffic over endpoints.
118
+
98
119
- Check whether network security group flow logs show the access and that storage logs show the access, as expected, over service endpoints.
120
+
99
121
- Contact Azure support.
122
+
100
123
- Access is denied for accounts not listed in the service endpoint policies
124
+
101
125
- Validate whether Azure Storage is configured to allow access from the virtual network over endpoints, or whether the default policy for the resource is set to *Allow All*.
102
-
- Ensure the accounts are not **classic storage accounts** with service endpoint policies on the subnet.
126
+
127
+
- Ensure the accounts aren't **classic storage accounts** with service endpoint policies on the subnet.
128
+
103
129
- A managed Azure Service stopped working after applying a Service Endpoint Policy over the subnet
104
-
- Managed services other than Azure SQL Managed Instance are not currently supported with service endpoints.
130
+
131
+
- Managed services other than Azure SQL Managed Instance aren't currently supported with service endpoints.
132
+
105
133
- Access to Managed Storage Accounts stopped working after applying a Service Endpoint Policy over the subnet
106
-
- Managed Storage Accounts are not supported with service endpoint policies. If configured, policies will deny access to all Managed Storage Accounts, by default. If your application needs access to Managed Storage Accounts, endpoint policies should not be used for this traffic.
134
+
135
+
- Managed Storage Accounts aren't supported with service endpoint policies. If configured, policies deny access to all Managed Storage Accounts, by default. If your application needs access to Managed Storage Accounts, endpoint policies shouldn't be used for this traffic.
107
136
108
137
## Provisioning
109
138
110
-
Service endpoint policies can be configured on subnets by a user with write access to a virtual network. Learn more about Azure [built-in roles](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json) and assigning specific permissions to [custom roles](../role-based-access-control/custom-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json).
139
+
A user with write access to a virtual network configures service endpoint policies on subnets. Learn more about Azure [built-in roles](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json) and assigning specific permissions to [custom roles](../role-based-access-control/custom-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json).
111
140
112
141
Virtual networks and Azure Storage accounts can be in the same or different subscriptions, or Azure Active Directory tenants.
113
142
114
143
## Limitations
115
144
116
145
- You can only deploy service endpoint policies on virtual networks deployed through the Azure Resource Manager deployment model.
146
+
117
147
- Virtual networks must be in the same region as the service endpoint policy.
148
+
118
149
- You can only apply service endpoint policy on a subnet if service endpoints are configured for the Azure services listed in the policy.
150
+
119
151
- You can't use service endpoint policies for traffic from your on-premises network to Azure services.
120
-
- Azure managed services other than Azure SQL Managed Instance do not currently support endpoint policies. This includes managed services deployed into shared subnets (such as *Azure Batch, Azure ADDS, Azure Application Gateway, Azure VPN Gateway, Azure Firewall*) or into dedicated subnets (such as *Azure App Service Environment, Azure Redis Cache, Azure API Management, classic managed services*).
152
+
153
+
- Azure managed services other than Azure SQL Managed Instance don't currently support endpoint policies. This limitation includes managed services deployed into shared subnets (such as *Azure Batch, Azure AD DS, Azure Application Gateway, Azure VPN Gateway, Azure Firewall*) or into dedicated subnets (such as *Azure App Service Environment, Azure Redis Cache, Azure API Management, classic managed services*).
121
154
122
155
> [!WARNING]
123
156
> Azure services deployed into your virtual network, such as Azure HDInsight, access other Azure services, such as Azure Storage, for infrastructure requirements. Restricting endpoint policy to specific resources could break access to these infrastructure resources for the Azure services deployed in your virtual network.
124
157
125
-
- Classic storage accounts are not supported in endpoint policies. Policies will deny access to all classic storage accounts, by default. If your application needs access to Azure Resource Manager and classic storage accounts, endpoint policies should not be used for this traffic.
158
+
- Classic storage accounts aren't supported in endpoint policies. Policies deny access to all classic storage accounts, by default. If your application needs access to Azure Resource Manager and classic storage accounts, endpoint policies shouldn't be used for this traffic.
126
159
127
160
## Pricing and limits
128
161
129
-
There is no additional charge for using service endpoint policies. The current pricing model for Azure services (such as, Azure Storage) applies as is today, over service endpoints.
162
+
There's no extra charge for using service endpoint policies. The current pricing model for Azure services (such as, Azure Storage) applies as is today, over service endpoints.
130
163
131
164
Following limits are enforced on service endpoint policies:
132
165
@@ -140,4 +173,5 @@ Following limits are enforced on service endpoint policies:
140
173
## Next Steps
141
174
142
175
- Learn [how to configure virtual network service endpoint policies](virtual-network-service-endpoint-policies-portal.md)
176
+
143
177
- Learn more about [Virtual network Service Endpoints](virtual-network-service-endpoints-overview.md)
0 commit comments