Azure Storage Access Policy
This page shows how to write Terraform for Storage Access Policy and write them securely.
azurerm_hpc_cache_access_policy (Terraform)
The Access Policy in Storage can be configured in Terraform with the resource name azurerm_hpc_cache_access_policy. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
-
hpc_cache_idrequired - string -
idoptional computed - string -
namerequired - string -
access_ruleset block-
accessrequired - string -
anonymous_gidoptional - number -
anonymous_uidoptional - number -
filteroptional - string -
root_squash_enabledoptional - bool -
scoperequired - string -
submount_access_enabledoptional - bool -
suid_enabledoptional - bool
-
-
timeoutssingle block
Explanation in Terraform Registry
Manages a HPC Cache Access Policy.
Tips: Best Practices for The Other Azure Storage Resources
In addition to the azurerm_storage_account, Azure Storage has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
azurerm_storage_account
Ensure to use HTTPS connections
It is better to use HTTPS instead of HTTP, which could be vulnerable to person-in-the-middle attacks.
azurerm_storage_account_network_rules
Ensure to allow Trusted Microsoft Services to bypass
It is better to allow Trusted Microsoft Services to bypass. They are not able to access storage account unless rules are set to allow them explicitly.
Azure Resource Manager Example
Azure Resource Manager code does not have the related resource.