Control: Storage accounts should restrict network access using virtual network rules
Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts.
Run the control in your terminal:
steampipe check terraform_azure_compliance.control.storage_account_restrict_network_access
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_azure_compliance.control.storage_account_restrict_network_access
This control uses a named query:storage_account_restrict_network_access