Share via

SFI - Secure PaaS Resources for Storage Accounts

Abhay Punjabi 20 Reputation points Microsoft Employee
2026-02-03T03:53:14.6366667+00:00

We use managed SFCs, and during deployment, resource groups with the prefix SFC_guid are created with Azure Storage Accounts, Load Balancers, and other resources.

We've received SFI alters to enable Network Security Perimeters for the Storage Accounts. However, these accounts are created by Service Fabric during our deployment, so there is no way to explicitly tie these Storage Accounts to NSPs.

How do you recommend we fix this issue?

For reference, this is one of the storage accounts flagged - Secure PaaS Resources, we have a number of such accounts.

Azure Service Fabric
Azure Service Fabric

An Azure service that is used to develop microservices and orchestrate containers on Windows and Linux.

0 comments No comments

Answer accepted by question author
  1. Ankit Yadav 13,365 Reputation points Microsoft External Staff Moderator
    2026-02-03T05:11:06.53+00:00

    Hello @Abhay Punjabi

    I've to address all your concerns listed out in small question and answer format below, kindly go through them one by one.

    Why are these storage accounts being flagged?
    Storage accounts under SFC_*GUID* resource groups are automatically created by Service Fabric Managed Clusters for diagnostics and operations. Because they’re created dynamically, they don’t always inherit network restrictions by default, which triggers security alerts.

    How can we secure them if we didn’t create them?
    You can apply network controls after creation:

    • Allow access only from the VNETs/subnets used by your Service Fabric cluster
      or
    • Use Network Security Perimeters (NSPs) to manage access with service-tag-based rules.

    Do we need to allow anything else? Yes. The storage accounts must still allow required access for diagnostics, logging, and operational recovery scenarios used by the cluster.

    Can we use NSPs instead of VNET rules?
    Yes. NSPs are supported and are a good alternative. You can start in Learning mode to avoid alerts, then move to Enforced mode after validating in non-production.

    What should we test first? Before applying changes in production, confirm:

    • No cluster warnings related to diagnostics
    • Logs remain accessible
    • Normal cluster operations continue

    What about Service Fabric Managed Clusters (SFMC)? For SFMC, you can associate the storage account directly with your NSP. Once configured, the linkage happens automatically.


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.