Configuring Network Access to Storage Accounts
One of the first security concepts you should consider when securing your storage account is to consider how and where your storage account is accessed. You can secure your storage account to a specific set of supported networks, which are granted access by configuring network rules so that only applications that request data over the specific set of networks can access the storage account. When these network rules are effective, the application needs to use proper authorization on the request. This authorization could be through either Entra ID credentials for blobs and queues, a SAS token, or a valid account access key.
In this section, you will explore the various methods of connectivity to your storage. You will learn about how each supports different objectives for your storage and how they introduce security within different boundaries. The first connection type you will explore is public endpoints. This topic explores how your...