ADF Portal UI access only seems to be protected by RBAC. And maybe conditional access policies (but this seems not clear, happy for pointers). I.e. cannot be restricted to private access (does this still hold in 2024?)
Consider the following scenario from a data exfiltration POV:
-
A has access to ADF UI
-
company X set up a storage account (storage 1) with AIR in a managed VNET and a managed private endpoint. The managed PE gets accepted in Xs private link.
-
A sets up storage account (storage 2) in some other azure supscription (maybe even in another region?) chosing some IR/endpoint config. the storage account also has an unmanaged PE.
-> Can A send Xs data from storage 1 to 2 without anything blocking the traffic?
Are there options to prohibit this?
For a SHIR behind a firewall, in my understanding this would not be possible because there has to be a rule between storage 1 unmanaged PE and storage 2 endpoint.