/
Cognitive Services Accounts Should Restrict Network Access

Cognitive Services Accounts Should Restrict Network Access

Description:

Network access to Cognitive Services accounts should be restricted. Configure network rules so only applications from allowed networks can access the Cognitive Services account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges.



Solution/Reference: 

To restrict access for Cognitive Services from public networks:
1. In the Azure portal, open Cognitive Services,
2. Select an item from the list, and open the "Networking" page,
3. In "Firewalls and virtual networks" select "Selected Networks and Private Endpoints" or "Disabled".

Learn more about Private Endpoints in https://go.microsoft.com/fwlink/?linkid=2129800.

Learn more about configuration Virtual Networks for Cognitive Services in https://go.microsoft.com/fwlink/?linkid=2110097.

Related content

Public Network Access Should Be Disabled for Cognitive Services Accounts
Public Network Access Should Be Disabled for Cognitive Services Accounts
More like this
Cognitive Services Accounts Should Enable Data Encryption
Cognitive Services Accounts Should Enable Data Encryption
More like this
Cognitive Services Accounts Should Use Customer Owned Storage or Enable Data Encryption
Cognitive Services Accounts Should Use Customer Owned Storage or Enable Data Encryption
More like this
Storage Accounts Should Restrict Network Access Using Virtual Network Rules
Storage Accounts Should Restrict Network Access Using Virtual Network Rules
More like this
Access to Storage Accounts with Firewall and Virtual Network Configurations Should be Restricted
Access to Storage Accounts with Firewall and Virtual Network Configurations Should be Restricted
More like this
Container Registries Should Not Allow Unrestricted Network Access
Container Registries Should Not Allow Unrestricted Network Access
More like this