Skip to content

Commit 3a22a46

Browse files
committed
Updates to search-security-overview.md
1 parent 4a1251e commit 3a22a46

File tree

1 file changed

+26
-32
lines changed

1 file changed

+26
-32
lines changed

articles/search/search-security-overview.md

Lines changed: 26 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -10,18 +10,22 @@ ms.update-cycle: 180-days
1010
ms.custom:
1111
- ignite-2023
1212
ms.topic: conceptual
13-
ms.date: 08/08/2025
13+
ms.date: 08/15/2025
1414
---
1515

1616
# Security in Azure AI Search
1717

18-
Azure AI Search provides comprehensive security controls across network access, authentication, authorization, and data protection to meet enterprise requirements. As a solution architect, you should understand three key security domains: **network traffic patterns** (inbound client requests, outbound service connections, and internal Microsoft-managed traffic), **access control mechanisms** (Microsoft Entra ID with role-based access control or API key authentication), and **data protection** (encryption in transit via TLS 1.2/1.3, encryption at rest with optional customer-managed keys for double encryption).
18+
Azure AI Search provides comprehensive security controls across network access, authentication, authorization, and data protection to meet enterprise requirements. As a solution architect, you should understand three key security domains:
19+
20+
+ **Network traffic patterns** (inbound client requests, outbound service connections, and internal Microsoft-managed traffic)
21+
+ **Access control mechanisms** (Microsoft Entra ID with role-based access control or API key authentication)
22+
+ **Data protection** (encryption in transit via TLS 1.2/1.3, encryption at rest with optional customer-managed keys for double encryption).
1923

2024
A search service supports multiple network security topologies—from IP firewall restrictions for basic protection to private endpoints for complete network isolation. For enterprise scenarios requiring granular permissions, you can implement document-level access controls and leverage network security perimeters to create logical boundaries around your Azure PaaS resources. All security features integrate with Azure's compliance framework and support common enterprise patterns like multitenancy and cross-service authentication using managed identities.
2125

2226
This article details the implementation options for each security layer to help you design appropriate security architectures for development and production environments.
2327

24-
## Data flow (network traffic patterns)
28+
## Network traffic patterns
2529

2630
An Azure AI Search service is hosted on Azure and is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
2731

@@ -49,16 +53,6 @@ At a minimum, all inbound requests must be authenticated using either of these o
4953

5054
Additionally, you can add [network security features](#service-access-and-authentication) to further restrict access to the endpoint. You can create either inbound rules in an IP firewall, or create private endpoints that fully shield your search service from the public internet.
5155

52-
### Internal traffic
53-
54-
Internal requests are secured and managed by Microsoft. You can't configure or control these connections. If you're locking down network access, no action on your part is required because internal traffic isn't customer-configurable.
55-
56-
Internal traffic consists of:
57-
58-
+ Service-to-service calls for tasks like authentication and authorization through Microsoft Entra ID, resource logging sent to Azure Monitor, and [private endpoint connections](service-create-private-endpoint.md) that utilize Azure Private Link.
59-
+ Requests made to Azure AI services APIs for [built-in skills](cognitive-search-predefined-skills.md)
60-
+ Requests made to the various models that support [semantic ranking](semantic-search-overview.md#availability-and-pricing).
61-
6256
### Outbound traffic
6357

6458
Outbound requests can be secured and managed by you. Outbound requests originate from a search service to other applications. These requests are typically made by indexers for text-based indexing, custom skills-based AI enrichment, and vectorizations at query time. Outbound requests include both read and write operations.
@@ -89,6 +83,16 @@ Configure same-region connections using either of the following approaches:
8983
+ [Trusted service exception](search-indexer-howto-access-trusted-service-exception.md)
9084
+ [Resource instance rules](/azure/storage/common/storage-network-security?tabs=azure-portal#grant-access-from-azure-resource-instances)
9185

86+
### Internal traffic
87+
88+
Internal requests are secured and managed by Microsoft. You can't configure or control these connections. If you're locking down network access, no action on your part is required because internal traffic isn't customer-configurable.
89+
90+
Internal traffic consists of:
91+
92+
+ Service-to-service calls for tasks like authentication and authorization through Microsoft Entra ID, resource logging sent to Azure Monitor, and [private endpoint connections](service-create-private-endpoint.md) that utilize Azure Private Link.
93+
+ Requests made to Azure AI services APIs for [built-in skills](cognitive-search-predefined-skills.md)
94+
+ Requests made to the various models that support [semantic ranking](semantic-search-overview.md#availability-and-pricing).
95+
9296
<a name="service-access-and-authentication"></a>
9397

9498
## Network security
@@ -136,19 +140,21 @@ Once a request is admitted to the search service, it must still undergo authenti
136140

137141
+ [Key-based authentication](search-security-api-keys.md) is performed on the request (not the calling app or user) through an API key, where the key is a string composed of randomly generated numbers and letters that prove the request is from a trustworthy source. Keys are required on every request. Submission of a valid key is considered proof the request originates from a trusted entity.
138142

139-
You can use both authentication methods, or [disable an approach](search-security-enable-roles.md) that you don't want available on your search service.
143+
Reliance on API key-based authentication means that you should have a plan for regenerating the admin key at regular intervals, per Azure security best practices. There are a maximum of two admin keys per search service. For more information about securing and managing API keys, see [Create and manage api-keys](search-security-api-keys.md).
144+
145+
Key-based authentication is the default for data plane operations (creating and using objects on the search service). You can use both authentication methods, or [disable an approach](search-security-enable-roles.md) that you don't want available on your search service.
140146

141147
## Authorization
142148

143149
Azure AI Search provides authorization models for service management and content management.
144150

145-
### Authorize service management
151+
### Privileged access
146152

147-
Resource management is authorized through [role-based access control](/azure/role-based-access-control/overview) in your Microsoft Entra tenant.
153+
All control plane (service or resource creation and management) tasks are authorized through [role assignments](/azure/role-based-access-control/overview), with no ability to use key-based authentication for service administration.
148154

149155
In Azure AI Search, Resource Manager is used to create or delete the service, manage API keys, scale the service, and configure security. As such, Azure role assignments will determine who can perform those tasks, regardless of whether they're using the [portal](search-manage.md), [PowerShell](search-manage-powershell.md), or the [Management REST APIs](/rest/api/searchmanagement).
150156

151-
[Three basic roles](search-security-rbac.md) (Owner, Contributor, Reader) apply to search service administration. Role assignments can be made using any supported methodology (portal, PowerShell, and so forth) and are honored service-wide.
157+
[Three basic roles](search-security-rbac.md) (Owner, Contributor, Reader) apply to search service administration. Role assignments are inherited from the subscription, but as an Owner or User Access Administrator, you can assign roles to others using any supported methodology (portal, PowerShell, and so forth).
152158

153159
> [!NOTE]
154160
> Using Azure-wide mechanisms, you can lock a subscription or resource to prevent accidental or unauthorized deletion of your search service by users with admin rights. For more information, see [Lock resources to prevent unexpected deletion](/azure/azure-resource-manager/management/lock-resources).
@@ -260,19 +266,13 @@ CMK support was rolled out in two phases. If you created your search service dur
260266

261267
Enabling CMK encryption will increase index size and degrade query performance. Based on observations to date, you can expect to see an increase of 30-60 percent in query times, although actual performance will vary depending on the index definition and types of queries. Because of the negative performance impact, we recommend that you only enable this feature on indexes that really require it. For more information, see [Configure customer-managed encryption keys in Azure AI Search](search-security-manage-encryption-keys.md).
262268

263-
## Security administration
264-
265-
### Manage API keys
266-
267-
Reliance on API key-based authentication means that you should have a plan for regenerating the admin key at regular intervals, per Azure security best practices. There are a maximum of two admin keys per search service. For more information about securing and managing API keys, see [Create and manage api-keys](search-security-api-keys.md).
268-
269-
### Activity and resource logs
269+
## Logging and monitoring
270270

271271
Azure AI Search doesn't log user identities so you can't refer to logs for information about a specific user. However, the service does log create-read-update-delete operations, which you might be able to correlate with other logs to understand the agency of specific actions.
272272

273273
Using alerts and the logging infrastructure in Azure, you can pick up on query volume spikes or other actions that deviate from expected workloads. For more information about setting up logs, see [Collect and analyze log data](monitor-azure-cognitive-search.md) and [Monitor query requests](search-monitor-queries.md).
274274

275-
### Certifications and compliance
275+
## Compliance and governance
276276

277277
Azure AI Search participates in regular audits, and has been certified against many global, regional, and industry-specific standards for both the public cloud and Azure Government. For the complete list, download the [**Microsoft Azure Compliance Offerings** whitepaper](https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/) from the official Audit reports page.
278278

@@ -282,13 +282,7 @@ Azure Policy is a capability built into Azure that helps you manage compliance f
282282

283283
For Azure AI Search, there's currently one built-in definition. It's for resource logging. You can assign a policy that identifies search services that are missing resource logging, and then turn it on. For more information, see [Azure Policy Regulatory Compliance controls for Azure AI Search](security-controls-policy.md).
284284

285-
## Watch this video
286-
287-
Watch this fast-paced video for an overview of the security architecture and each feature category.
288-
289-
> [!VIDEO https://learn.microsoft.com/Shows/AI-Show/Azure-Cognitive-Search-Whats-new-in-security/player]
290-
291-
## See also
285+
## Learn more
292286

293287
+ [Azure security fundamentals](/azure/security/fundamentals/)
294288
+ [Azure Security](https://azure.microsoft.com/overview/security)

0 commit comments

Comments
 (0)