Skip to content

Commit 36372fd

Browse files
committed
more updates
1 parent 3a22a46 commit 36372fd

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/search/search-security-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Security overview
2+
title: Secure your Azure AI Search deployment
33
titleSuffix: Azure AI Search
44
description: Learn about the security features in Azure AI Search to protect endpoints, content, and operations.
55
manager: nitinme
@@ -17,17 +17,17 @@ ms.date: 08/15/2025
1717

1818
Azure AI Search provides comprehensive security controls across network access, authentication, authorization, and data protection to meet enterprise requirements. As a solution architect, you should understand three key security domains:
1919

20-
+ **Network traffic patterns** (inbound client requests, outbound service connections, and internal Microsoft-managed traffic)
20+
+ **Network traffic patterns and network security** (inbound client requests, outbound service connections, and internal Microsoft-managed traffic)
2121
+ **Access control mechanisms** (Microsoft Entra ID with role-based access control or API key authentication)
22-
+ **Data protection** (encryption in transit via TLS 1.2/1.3, encryption at rest with optional customer-managed keys for double encryption).
22+
+ **Data residency and protection** (encryption in transit via TLS 1.2/1.3, encryption at rest with optional customer-managed keys for double encryption).
2323

2424
A search service supports multiple network security topologies—from IP firewall restrictions for basic protection to private endpoints for complete network isolation. For enterprise scenarios requiring granular permissions, you can implement document-level access controls and leverage network security perimeters to create logical boundaries around your Azure PaaS resources. All security features integrate with Azure's compliance framework and support common enterprise patterns like multitenancy and cross-service authentication using managed identities.
2525

2626
This article details the implementation options for each security layer to help you design appropriate security architectures for development and production environments.
2727

2828
## Network traffic patterns
2929

30-
An Azure AI Search service is hosted on Azure and is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
30+
An Azure AI Search service can be hosted in the Azure public cloud, an Azure private cloud, or a sovereign cloud (such as Azure government). By default, for all cloud hosts, the search service is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
3131

3232
Azure AI Search has three basic network traffic patterns:
3333

0 commit comments

Comments
 (0)