Hi @Andrew McWilliams,
Thanks for the response,
If a user is assigned the Storage Blob Data Reader role, they will have permissions to read blobs. While deny assignments are intended to block actions, if they are not explicitly configured to deny the specific actions permitted by the role, the role may still take precedence. Therefore, it is crucial to ensure that deny assignments are accurately set up to restrict the actions you want to block.
Also, as said that users cannot directly create deny assignments; however, they can configure them through deployment stacks. Therefore, while deployment stacks enable the creation of deny assignments, it is not possible to create them independently outside of this context.
Here the limitation is due to Azure managing these assignments, meaning users are unable to create them directly through the Azure portal or other interfaces.
And, regarding deployment stacks, they manage only explicitly created resources. If a resource is created implicitly, such as those automatically generated as dependencies of other resources, the deny settings applied to the deployment stack will not affect these implicitly created resources. Consequently, if the storage account or its components were created implicitly, the deny assignment may not apply, potentially allowing access that is expected to be restricted.
I hope this information helps. Please do let us know if you have any further queries.
Kindly consider upvoting the comment if the information provided is helpful. This can assist other community members in resolving similar issues.