Skip to content

Commit e608027

Browse files
committed
Generated security doc for horizontal
1 parent 9ffad51 commit e608027

File tree

1 file changed

+110
-0
lines changed

1 file changed

+110
-0
lines changed
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Secure your Azure AI Search deployment
3+
description: Learn how to secure Azure AI Search, with best practices for protecting your deployment.
4+
author: HeidiSteen
5+
ms.author: heidist
6+
ms.service: cognitive-search
7+
ms.topic: conceptual
8+
ms.custom: horz-security
9+
ms.date: 03/19/2024
10+
ai-usage: ai-assisted
11+
---
12+
13+
# Secure your Azure AI Search deployment
14+
15+
Azure AI Search provides a managed search service that enables rich search experiences across content stored in Azure data sources. When deploying this service, it's important to follow security best practices to protect data, configurations, and infrastructure.
16+
17+
This article provides guidance on how to best secure your Azure AI Search deployment.
18+
19+
## Network security
20+
21+
Azure AI Search is a PaaS service with a public endpoint by default. Properly securing network access is essential to protect your search service from unauthorized access and potential data breaches.
22+
23+
- **Configure IP firewall rules**: Restrict access to your search service by allowing only specific IP addresses or IP address ranges. This prevents unauthorized access from unrecognized networks. See [Configure IP firewall in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/service-configure-firewall).
24+
25+
- **Implement private endpoints**: Establish a private connection between your virtual network and Azure AI Search using Private Link to eliminate exposure to the public internet. This enables secure access to your search service from within your virtual network. See [Configure a private endpoint for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/service-create-private-endpoint).
26+
27+
- **Use virtual networks with service endpoints**: Secure your search service by limiting access to specific virtual networks and subnets, providing network isolation and enhanced security. See [Configure a service endpoint for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/service-configure-network-security).
28+
29+
- **Deploy into Azure China or Azure Government clouds**: For scenarios requiring higher levels of isolation and compliance, deploy Azure AI Search in sovereign clouds. This provides additional network isolation and compliance with regional requirements. See [Azure AI Search in sovereign clouds](https://learn.microsoft.com/en-us/azure/search/search-security-overview#azure-cognitive-search-in-sovereign-clouds).
30+
31+
## Identity and access management
32+
33+
Controlling who can access and manage your Azure AI Search service is critical for maintaining security and compliance. Proper authentication and authorization mechanisms help prevent unauthorized access to your search data.
34+
35+
- **Implement Azure role-based access control (RBAC)**: Assign specific roles to users, groups, and applications to grant appropriate levels of access to your search service. This ensures the principle of least privilege is applied. See [Azure role-based access control for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-rbac).
36+
37+
- **Use managed identities for data source connections**: Connect to data sources securely without storing credentials by using managed identities. This eliminates the need to manage and rotate connection credentials manually. See [Configure a connection to a data source using a managed identity](https://learn.microsoft.com/en-us/azure/search/search-howto-managed-identities-data-sources).
38+
39+
- **Implement API key management**: Rotate admin and query API keys regularly and use separate query keys with appropriate permissions for different client applications. This limits the impact if a key is compromised. See [Create and manage API keys for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-api-keys).
40+
41+
- **Configure Azure Active Directory authentication**: Enable AAD authentication for search operations to leverage centralized identity management, conditional access policies, and multi-factor authentication. See [Configure Azure Active Directory authentication for client applications](https://learn.microsoft.com/en-us/azure/search/search-security-overview#azure-active-directory).
42+
43+
## Data protection
44+
45+
Azure AI Search indexes may contain sensitive information that requires protection both at rest and in transit. Implementing proper data protection measures is essential to maintain confidentiality and integrity of your search content.
46+
47+
- **Enable customer-managed keys**: Use your own encryption keys stored in Azure Key Vault to encrypt your search service data. This gives you control over key rotation and revocation. See [Configure customer-managed keys for encryption in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-manage-encryption-keys).
48+
49+
- **Use secure connections (TLS/SSL)**: Enforce HTTPS connections to your search service to ensure data in transit is encrypted. This prevents eavesdropping and man-in-the-middle attacks. See [Enforce TLS requirements for connections to Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-overview#encryption-in-transit).
50+
51+
- **Implement row-level security**: Filter search results based on user identity or group membership to ensure users only see data they're authorized to access. This provides granular access control at the document level. See [Security filters for trimming results in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-trimming-for-azure-search).
52+
53+
- **Use field-level security**: Exclude sensitive fields from search results by controlling which fields are retrieved in queries. This prevents unauthorized access to sensitive data. See [Secure content through strategic index design](https://learn.microsoft.com/en-us/azure/search/search-security-overview#secure-content-through-strategic-index-design).
54+
55+
## Logging and monitoring
56+
57+
Comprehensive logging and monitoring are crucial for detecting and responding to security incidents, as well as maintaining an audit trail of actions taken against your search service.
58+
59+
- **Enable diagnostic logging**: Configure Azure Monitor Logs to collect and analyze operational logs from your search service for audit and troubleshooting purposes. This provides visibility into service operations and potential security issues. See [Collect and analyze log data for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-monitor-logs).
60+
61+
- **Set up alerts for suspicious activities**: Create Azure Monitor alerts based on metrics and logs to detect unusual patterns or potential security breaches. This enables prompt response to security incidents. See [Set up alerts in Azure Monitor for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-monitor-usage).
62+
63+
- **Monitor service health and performance**: Track resource utilization, query latency, and throttling metrics to ensure service availability and optimize performance. This helps identify potential security-related performance issues. See [Monitor query metrics in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-monitor-queries).
64+
65+
- **Enable audit logging for management operations**: Track administrative actions performed on your search service through Azure Activity Log. This provides accountability and helps in forensic analysis. See [View activity logs to audit operations in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-monitor-logs#view-activity-logs).
66+
67+
## Compliance and governance
68+
69+
Adhering to compliance requirements and implementing proper governance controls helps ensure that your Azure AI Search deployment meets organizational and regulatory standards.
70+
71+
- **Apply Azure Policy definitions**: Enforce organizational standards and assess compliance for your Azure AI Search resources using Azure Policy. This helps maintain consistent security configurations across your environment. See [Azure Policy built-in definitions for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-overview#compliance).
72+
73+
- **Implement resource locks**: Prevent accidental deletion or modification of your search service by applying resource locks. This safeguards against unintended changes that could impact security. See [Apply resource locks to prevent accidental deletion](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources).
74+
See also: [General guidance – Apply Azure resource locks](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources).
75+
76+
- **Use tags for security classification**: Apply metadata tags to categorize search services based on data sensitivity and compliance requirements. This facilitates proper governance and security controls. See [Use tags to organize your Azure resources](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/tag-resources).
77+
See also: [General guidance – Organize Azure resources using tags](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/tag-resources).
78+
79+
- **Review compliance documentation**: Regularly review Azure AI Search compliance certifications and documentation to ensure alignment with your regulatory requirements. See [Azure compliance documentation](https://learn.microsoft.com/en-us/azure/compliance/).
80+
81+
## Backup and recovery
82+
83+
Implementing robust backup and recovery strategies ensures business continuity and data protection in case of service disruptions or data corruption.
84+
85+
- **Create index replicas**: Maintain multiple replicas of your indexes to ensure high availability and protect against data loss. This provides redundancy and improves resilience. See [High availability for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-performance-optimization#high-availability).
86+
87+
- **Implement index snapshots**: Periodically save the state of your indexes to restore them in case of corruption or accidental deletion. This provides a recovery point for your search data. See [Import and export index snapshots](https://learn.microsoft.com/en-us/azure/search/search-howto-index-backup-restore).
88+
89+
- **Design for disaster recovery**: Deploy search services across multiple regions and implement a strategy for rebuilding indexes when needed. This ensures business continuity during regional outages. See [Disaster recovery for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-performance-optimization#disaster-recovery).
90+
91+
- **Document indexer definitions**: Maintain documentation of indexer configurations to facilitate quick rebuilding of indexes from data sources if necessary. This expedites recovery operations. See [Indexers in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-indexer-overview).
92+
93+
## Service-specific security
94+
95+
Azure AI Search has unique security considerations related to search operations, data indexing, and AI enrichment that require specific attention.
96+
97+
- **Implement synonym maps with caution**: Carefully review and secure synonym maps to prevent potential security issues with query expansion. Improperly configured synonyms could lead to information disclosure. See [Create synonym maps in Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-synonyms).
98+
99+
- **Secure AI enrichment pipelines**: When using AI enrichment with Azure AI Services, implement proper authentication and network security for the cognitive services resources. This protects sensitive data during the enrichment process. See [Security considerations for AI enrichment](https://learn.microsoft.com/en-us/azure/search/cognitive-search-concept-security).
100+
101+
- **Validate input data for indexing**: Implement proper validation for data being indexed to prevent injection attacks or indexing of malicious content. This ensures the integrity of your search index. See [Validate input data for indexing](https://learn.microsoft.com/en-us/azure/search/search-security-overview#secure-content-through-strategic-index-design).
102+
103+
- **Control search suggestions**: Configure suggestion modes and filtering to prevent exposure of sensitive information in typeahead experiences. This reduces the risk of information leakage through autocomplete suggestions. See [Add suggestions to client apps](https://learn.microsoft.com/en-us/azure/search/index-add-suggesters).
104+
105+
## Learn more
106+
107+
- [Microsoft Cloud Security Benchmark – Search](https://learn.microsoft.com/en-us/security/benchmark/azure/baselines/azure-cognitive-search-security-baseline)
108+
- [Well-Architected Framework – Search considerations](https://learn.microsoft.com/en-us/azure/architecture/framework/services/search/azure-cognitive-search/azure-cognitive-search-security)
109+
- [Security overview for Azure AI Search](https://learn.microsoft.com/en-us/azure/search/search-security-overview)
110+
See also: [Azure Security Documentation](https://learn.microsoft.com/en-us/azure/security/).

0 commit comments

Comments
 (0)