Skip to content

Latest commit

 

History

History
 
 

private_blob_containers

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

Azure Ensure Blob Containers Set To Private

What it does

This policy checks all Azure storage accounts that use the blob service to ensure that their blob containers are configured to not allow public access. An incident is raised with the offending blob containers and storage accounts if any are found that do.

Functional Details

The Azure Resource Manager API is used to get a list of subscriptions and storage accounts within those subscriptions. The policy then gathers a list of blob containers within each storage account in order to verify that "Properties/PublicAccess" is empty.

Input Parameters

This policy has the following input parameters required when launching the policy.

  • Email addresses to notify - Email addresses of the recipients you wish to notify when new incidents are created
  • Azure Endpoint - Azure Endpoint to access resources

Prerequisites

This policy uses credentials for connecting to the cloud -- in order to apply this policy you must have a credential registered in the system that is compatible with this policy. If there are no credentials listed when you apply the policy, please contact your cloud admin and ask them to register a credential that is compatible with this policy. The information below should be consulted when creating the credential.

Credential configuration

For administrators creating and managing credentials to use with this policy, the following information is needed:

Provider tag values to match this policy: azure_rm, azure_storage

Required permissions in the provider:

  • Microsoft.Resources/subscriptions/read
  • Microsoft.Storage/storageAccounts/read

Supported Clouds

  • Azure Resource Manager

Cost

This Policy Template does not incur any cloud costs.