Azure network security perimeter with storage accounts and Runbooks

JUFO 81 Reputation points
2025-03-18T08:18:58.1033333+00:00

I know this is a preview feature, and I don't know if it will be fixed in the future.

The problem arises when you try to secure traffic between Azure serverless runbooks and a storage account.

No matter what configuration you use, the runbook will access the storage account using a 10.x.x.x IP.

That means you can't secure traffic using storage account firewall rules since private IPs are not allowed.

I thought that with Azure's network security perimeter, this would be fixed since you can put your storage inside and specify that only resources from the subscription are allowed to access it.

But no, it still doesn't work.

Is Microsoft aware of this issue? I know you can use hybrid workers to get a public IP and so on, but that destroys the power of runbooks if you can't use the serverless option.

Thanks for your time!

Azure Storage Accounts
Azure Storage Accounts
Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
3,462 questions
{count} votes

Accepted answer
  1. Hari Babu Vattepally 2,480 Reputation points Microsoft External Staff
    2025-03-19T16:02:35.7033333+00:00

    Hi @JUFO,

    The issue with Azure network security perimeter and serverless runbooks is a known limitation. When using serverless runbooks, communication with Azure Storage accounts generally goes through private IPs, which complicates the use of public IP configurations.

    As you mentioned, private endpoints for storage accounts only allow inbound communication. This means that serverless runbooks cannot use these endpoints for outbound communication. Therefore, hybrid workers are required to ensure secure communication between runbooks and storage accounts.

    Coming to your actually question. Yes, the network security perimeter aims to restrict public access and ensure secure communication within the same subscription. However, it is not effective for serverless runbooks, as they depend on private IPs for their communication. So, the only reliable method for securing this communication is through hybrid workers, which can use either public IPs or private links.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.