You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-security-overview.md
+26-32Lines changed: 26 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,18 +10,22 @@ ms.update-cycle: 180-days
10
10
ms.custom:
11
11
- ignite-2023
12
12
ms.topic: conceptual
13
-
ms.date: 08/08/2025
13
+
ms.date: 08/15/2025
14
14
---
15
15
16
16
# Security in Azure AI Search
17
17
18
-
Azure AI Search provides comprehensive security controls across network access, authentication, authorization, and data protection to meet enterprise requirements. As a solution architect, you should understand three key security domains: **network traffic patterns** (inbound client requests, outbound service connections, and internal Microsoft-managed traffic), **access control mechanisms** (Microsoft Entra ID with role-based access control or API key authentication), and **data protection** (encryption in transit via TLS 1.2/1.3, encryption at rest with optional customer-managed keys for double encryption).
18
+
Azure AI Search provides comprehensive security controls across network access, authentication, authorization, and data protection to meet enterprise requirements. As a solution architect, you should understand three key security domains:
19
+
20
+
+**Network traffic patterns** (inbound client requests, outbound service connections, and internal Microsoft-managed traffic)
21
+
+**Access control mechanisms** (Microsoft Entra ID with role-based access control or API key authentication)
22
+
+**Data protection** (encryption in transit via TLS 1.2/1.3, encryption at rest with optional customer-managed keys for double encryption).
19
23
20
24
A search service supports multiple network security topologies—from IP firewall restrictions for basic protection to private endpoints for complete network isolation. For enterprise scenarios requiring granular permissions, you can implement document-level access controls and leverage network security perimeters to create logical boundaries around your Azure PaaS resources. All security features integrate with Azure's compliance framework and support common enterprise patterns like multitenancy and cross-service authentication using managed identities.
21
25
22
26
This article details the implementation options for each security layer to help you design appropriate security architectures for development and production environments.
23
27
24
-
## Data flow (network traffic patterns)
28
+
## Network traffic patterns
25
29
26
30
An Azure AI Search service is hosted on Azure and is typically accessed by client applications over public network connections. While that pattern is predominant, it's not the only traffic pattern that you need to care about. Understanding all points of entry as well as outbound traffic is necessary background for securing your development and production environments.
27
31
@@ -49,16 +53,6 @@ At a minimum, all inbound requests must be authenticated using either of these o
49
53
50
54
Additionally, you can add [network security features](#service-access-and-authentication) to further restrict access to the endpoint. You can create either inbound rules in an IP firewall, or create private endpoints that fully shield your search service from the public internet.
51
55
52
-
### Internal traffic
53
-
54
-
Internal requests are secured and managed by Microsoft. You can't configure or control these connections. If you're locking down network access, no action on your part is required because internal traffic isn't customer-configurable.
55
-
56
-
Internal traffic consists of:
57
-
58
-
+ Service-to-service calls for tasks like authentication and authorization through Microsoft Entra ID, resource logging sent to Azure Monitor, and [private endpoint connections](service-create-private-endpoint.md) that utilize Azure Private Link.
59
-
+ Requests made to Azure AI services APIs for [built-in skills](cognitive-search-predefined-skills.md)
60
-
+ Requests made to the various models that support [semantic ranking](semantic-search-overview.md#availability-and-pricing).
61
-
62
56
### Outbound traffic
63
57
64
58
Outbound requests can be secured and managed by you. Outbound requests originate from a search service to other applications. These requests are typically made by indexers for text-based indexing, custom skills-based AI enrichment, and vectorizations at query time. Outbound requests include both read and write operations.
@@ -89,6 +83,16 @@ Configure same-region connections using either of the following approaches:
89
83
+[Trusted service exception](search-indexer-howto-access-trusted-service-exception.md)
Internal requests are secured and managed by Microsoft. You can't configure or control these connections. If you're locking down network access, no action on your part is required because internal traffic isn't customer-configurable.
89
+
90
+
Internal traffic consists of:
91
+
92
+
+ Service-to-service calls for tasks like authentication and authorization through Microsoft Entra ID, resource logging sent to Azure Monitor, and [private endpoint connections](service-create-private-endpoint.md) that utilize Azure Private Link.
93
+
+ Requests made to Azure AI services APIs for [built-in skills](cognitive-search-predefined-skills.md)
94
+
+ Requests made to the various models that support [semantic ranking](semantic-search-overview.md#availability-and-pricing).
95
+
92
96
<aname="service-access-and-authentication"></a>
93
97
94
98
## Network security
@@ -136,19 +140,21 @@ Once a request is admitted to the search service, it must still undergo authenti
136
140
137
141
+[Key-based authentication](search-security-api-keys.md) is performed on the request (not the calling app or user) through an API key, where the key is a string composed of randomly generated numbers and letters that prove the request is from a trustworthy source. Keys are required on every request. Submission of a valid key is considered proof the request originates from a trusted entity.
138
142
139
-
You can use both authentication methods, or [disable an approach](search-security-enable-roles.md) that you don't want available on your search service.
143
+
Reliance on API key-based authentication means that you should have a plan for regenerating the admin key at regular intervals, per Azure security best practices. There are a maximum of two admin keys per search service. For more information about securing and managing API keys, see [Create and manage api-keys](search-security-api-keys.md).
144
+
145
+
Key-based authentication is the default for data plane operations (creating and using objects on the search service). You can use both authentication methods, or [disable an approach](search-security-enable-roles.md) that you don't want available on your search service.
140
146
141
147
## Authorization
142
148
143
149
Azure AI Search provides authorization models for service management and content management.
144
150
145
-
### Authorize service management
151
+
### Privileged access
146
152
147
-
Resource management is authorized through [role-based access control](/azure/role-based-access-control/overview) in your Microsoft Entra tenant.
153
+
All control plane (service or resource creation and management) tasks are authorized through [role assignments](/azure/role-based-access-control/overview), with no ability to use key-based authentication for service administration.
148
154
149
155
In Azure AI Search, Resource Manager is used to create or delete the service, manage API keys, scale the service, and configure security. As such, Azure role assignments will determine who can perform those tasks, regardless of whether they're using the [portal](search-manage.md), [PowerShell](search-manage-powershell.md), or the [Management REST APIs](/rest/api/searchmanagement).
150
156
151
-
[Three basic roles](search-security-rbac.md) (Owner, Contributor, Reader) apply to search service administration. Role assignments can be made using any supported methodology (portal, PowerShell, and so forth) and are honored service-wide.
157
+
[Three basic roles](search-security-rbac.md) (Owner, Contributor, Reader) apply to search service administration. Role assignments are inherited from the subscription, but as an Owner or User Access Administrator, you can assign roles to others using any supported methodology (portal, PowerShell, and so forth).
152
158
153
159
> [!NOTE]
154
160
> Using Azure-wide mechanisms, you can lock a subscription or resource to prevent accidental or unauthorized deletion of your search service by users with admin rights. For more information, see [Lock resources to prevent unexpected deletion](/azure/azure-resource-manager/management/lock-resources).
@@ -260,19 +266,13 @@ CMK support was rolled out in two phases. If you created your search service dur
260
266
261
267
Enabling CMK encryption will increase index size and degrade query performance. Based on observations to date, you can expect to see an increase of 30-60 percent in query times, although actual performance will vary depending on the index definition and types of queries. Because of the negative performance impact, we recommend that you only enable this feature on indexes that really require it. For more information, see [Configure customer-managed encryption keys in Azure AI Search](search-security-manage-encryption-keys.md).
262
268
263
-
## Security administration
264
-
265
-
### Manage API keys
266
-
267
-
Reliance on API key-based authentication means that you should have a plan for regenerating the admin key at regular intervals, per Azure security best practices. There are a maximum of two admin keys per search service. For more information about securing and managing API keys, see [Create and manage api-keys](search-security-api-keys.md).
268
-
269
-
### Activity and resource logs
269
+
## Logging and monitoring
270
270
271
271
Azure AI Search doesn't log user identities so you can't refer to logs for information about a specific user. However, the service does log create-read-update-delete operations, which you might be able to correlate with other logs to understand the agency of specific actions.
272
272
273
273
Using alerts and the logging infrastructure in Azure, you can pick up on query volume spikes or other actions that deviate from expected workloads. For more information about setting up logs, see [Collect and analyze log data](monitor-azure-cognitive-search.md) and [Monitor query requests](search-monitor-queries.md).
274
274
275
-
### Certifications and compliance
275
+
##Compliance and governance
276
276
277
277
Azure AI Search participates in regular audits, and has been certified against many global, regional, and industry-specific standards for both the public cloud and Azure Government. For the complete list, download the [**Microsoft Azure Compliance Offerings** whitepaper](https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/) from the official Audit reports page.
278
278
@@ -282,13 +282,7 @@ Azure Policy is a capability built into Azure that helps you manage compliance f
282
282
283
283
For Azure AI Search, there's currently one built-in definition. It's for resource logging. You can assign a policy that identifies search services that are missing resource logging, and then turn it on. For more information, see [Azure Policy Regulatory Compliance controls for Azure AI Search](security-controls-policy.md).
284
284
285
-
## Watch this video
286
-
287
-
Watch this fast-paced video for an overview of the security architecture and each feature category.
0 commit comments