Hi @JUFO,
The issue with Azure network security perimeter and serverless runbooks is a known limitation. When using serverless runbooks, communication with Azure Storage accounts generally goes through private IPs, which complicates the use of public IP configurations.
As you mentioned, private endpoints for storage accounts only allow inbound communication. This means that serverless runbooks cannot use these endpoints for outbound communication. Therefore, hybrid workers are required to ensure secure communication between runbooks and storage accounts.
Coming to your actually question. Yes, the network security perimeter aims to restrict public access and ensure secure communication within the same subscription. However, it is not effective for serverless runbooks, as they depend on private IPs for their communication. So, the only reliable method for securing this communication is through hybrid workers, which can use either public IPs or private links.