Hello Julian Bednarz
Thank you for your question!
The reason you don't see the Azure Monitor System service principal in the IAM section is because it's not using traditional RBAC permissions.
The question is, if it has permissions to upload content, why is it not explicitly shown in the IAM section?
what you see in IAM is explicit role assignments to users, groups, service principals, or managed identities shows up in the "Access control (IAM)" blade Examples: Storage Blob Data Contributor, Reader, etc.
what Azure Monitor uses is to Built-in exceptions for Microsoft first-party services and Operates at the Azure Resource Manager level, not RBAC level this is why it doesn't appear in IAM because it's not an RBAC assignment.
When you enable "Allow Azure services on the trusted services list," you're essentially creating a network-level exception that allows these pre-approved Microsoft services to bypass both:
- Network access restrictions
- RBAC permission checks
This is why the Azure Monitor System service principal can write to your storage account without appearing in your IAM list - it's using a different, more fundamental permission pathway that operates below the RBAC layer.
Hope the above answer helps! Please let us know do you have any further queries I'm here to help.
Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.