Enforcing an IP-Based Access Policy to Azure Cloud Connection

For increased security, you can configure Azure to allow the Cloud Rewind connection only from Cloud Rewind's fixed IP address. A configured IP-based access policy defends against the (unlikely) scenario of a bad actor obtaining Cloud Rewind's credentials to the Azure connection.

In Azure, you'll create a conditional access policy that will apply specifically to the Cloud Rewind application. You'll configure the policy to block access from all locations other than Cloud Rewind's fixed IP address.

Prerequisites

  • Azure Workload Identities Premium license

  • Azure user with the following Entra roles:

    • Application Administrator

    • Conditional Access Administrator

  • Cloud Rewind application already configured in your Azure tenant

Configuring the Access Policy

To configure an Azure IP-based access policy:

  1. Log into Azure as a user with the above required roles.

  2. Define the Cloud Rewind IP location:

    1. Obtain the NAT IP address of the relevant Cloud Rewind endpoint, from here.

    2. In Azure, go to Microsoft Entra ID > Manage > Security > Manage > Named locations.

    3. Click + IP ranges location and Name the location.

    4. Select Mark as trusted location, and add the IP address with CIDR extension /32 .

    5. Click Create.

  3. Create a new policy for the Cloud Rewind application:

    1. Go to Conditional Access and click + New policy:

      New-policy

    2. Name the policy.

    3. Under Assignments select Users or workload identities, and then under What does this policy apply to? select Workload identities:

      Workload_IDs

    4. Select Include > Select service principals, and select the Cloud Rewind application.

  4. Configure the policy to block access from all locations other than the Cloud Rewind IP address:

    1. Under Target resources select Network, and then on the right select Include > Any network or location:

      Network_include

    2. Select Exclude > Selected locations, and select the IP location configured above.

    3. Select Grant > Block access > Select:

      Grant_block

  5. Under Enable policy select On, and click Create.

It may take a few minutes for the new configuration to apply.

×

Loading...