Skip to content

Commit 32c0dd5

Browse files
committed
Some revisions to the overview
1 parent 9e4f487 commit 32c0dd5

File tree

1 file changed

+4
-14
lines changed

1 file changed

+4
-14
lines changed

articles/storage/common/storage-network-security-overview.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,7 @@ ms.author: normesta
1313

1414
# Azure Storage network security
1515

16-
Intro sentance here.
17-
18-
First, configure account to accept requests only from secure connections (HTTPS). Then, where possible, create private links to your storage account which secure access over a *private endpoint*. If your storage account must accept traffic over the *public endpoint*, then add rules network rules or include your storage account in a network security perimeter.
19-
20-
After you secure the network boundary, you can increased protection against infiltration of data by restricting the the source of copy operations. To learn more, [Restrict the source of copy operations to a storage account](security-restrict-copy-operations.md).
21-
22-
This article describes the configuration options for securing traffic to and from your storage account.
16+
Azure Storage provides multiple layers of network security to protect your data and control access to your storage accounts. This article provides an overview of the key network security features and configuration options available for Azure Storage accounts. You can secure your storage account by requiring HTTPS connections, implementing private endpoints for maximum isolation, or configuring public endpoint access through firewall rules and network security perimeters. Each approach offers different levels of security and complexity, allowing you to choose the right combination based on your specific requirements, network architecture, and security policies.
2317

2418
> [!NOTE]
2519
> Clients that make requests from allowed sources must also meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
@@ -30,7 +24,7 @@ By default, storage accounts accept requests over HTTPS only. Any requests made
3024

3125
## Private endpoints
3226

33-
A private endpoint assigns a private IP address from your virtual network to your storage account. Clients connect to your storage account by using a private link to the private endpoint. Traffic is routed over the Microsoft backbone network so traffic does not travel over the public internet. You can fine-tune access rules by using [Network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md). If you want to permit traffic to originate only from private links, you can block all access over the public endpoint. Private endpoints have cost meters, but provide maximum network isolation.
27+
Where possible, create private links to your storage account which secure access over a *private endpoint*. A private endpoint assigns a private IP address from your virtual network to your storage account. Clients connect to your storage account by using a private link to the private endpoint. Traffic is routed over the Microsoft backbone network so traffic does not travel over the public internet. You can fine-tune access rules by using [Network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md). If you want to permit traffic to originate only from private links, you can block all access over the public endpoint. Private endpoints have cost meters, but provide maximum network isolation.
3428

3529
To learn more about using a private endpoint to secure traffic to your storage account, see [Use private endpoints for Azure Storage](storage-private-endpoints.md).
3630

@@ -61,13 +55,9 @@ Another way to limit traffic to your public endpoint is to include your storage
6155

6256
To learn more, see [Network security perimeter for Azure Storage](storage-network-security-perimeter.md).
6357

64-
### Authorization
65-
66-
Clients granted access via network rules must continue to meet the authorization requirements of the storage account to access the data. Authorization is supported with Microsoft Entra credentials for blobs and queues, with a valid account access key, or with a shared access signature (SAS) token.
67-
68-
When you configure a blob container for anonymous public access, requests to read data in that container don't need to be authorized, but the firewall rules remain in effect and will block anonymous traffic.
58+
## Copy operation scopes (preview)
6959

70-
An application that accesses a storage account when network rules are in effect still requires proper authorization for the request. Authorization is supported with Microsoft Entra credentials for blobs, tables, file shares and queues, with a valid account access key, or with a shared access signature (SAS) token. When you configure a blob container for anonymous access, requests to read data in that container don't need to be authorized. The firewall rules remain in effect and will block anonymous traffic.
60+
You can use the **Permitted scope for copy operations** preview feature to restrict data copying to storage accounts by limiting sources to the same Microsoft Entra tenant or virtual network with private links. This can help to prevent unwanted data infiltration from untrusted environments. To learn more, [Restrict the source of copy operations to a storage account](security-restrict-copy-operations.md).
7161

7262
## See also
7363

0 commit comments

Comments
 (0)