You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/control-plane-security.md
+32-30Lines changed: 32 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-ahibbard
6
6
ms.service: azure-netapp-files
7
7
ms.topic: conceptual
8
-
ms.date: 09/27/2024
8
+
ms.date: 09/30/2024
9
9
ms.author: anfdocs
10
10
---
11
11
# Understand Azure NetApp Files control plane security
@@ -31,12 +31,12 @@ A set of operations and services used to manage and control access to Azure NetA
31
31
32
32
Managing Microsoft platform-managed keys or customer-managed keys involves control plane operations that affect the following:
33
33
34
-
- Key management: The control plane allows you to manage the lifecycle of your encryption keys, including creation, rotation, and deletion. This ensures that you have full control over your data encryption keys.
35
-
- Access control: Through the control plane, you can define and enforce access policies using Azure RBAC. This ensures that only authorized users and services can access or manage your keys.
36
-
- Integration with Azure Key Vault: The control plane facilitates the integration of Azure NetApp Files with Azure Key Vault, where your customer-managed keys are stored. This integration ensures secure key storage and management.
37
-
- Encryption operations: For encryption and decryption operations, the control plane handles Azure Key Vault requests to unwrap the account encryption key so your data is securely encrypted and decrypted as needed.
38
-
- Auditing and monitoring: The control plane provides capabilities for auditing and monitoring key usage. This helps you track who accessed your keys and when, enhancing security and compliance.
39
-
For more information please see, Configure customer-managed keys for Azure NetApp Files volume encryption.
34
+
-**Key management:** The control plane allows you to manage the lifecycle of your encryption keys, including creation, rotation, and deletion. This ensures that you have full control over your data encryption keys.
35
+
-**Access control:** Through the control plane, you can define and enforce access policies using Azure RBAC. This ensures that only authorized users and services can access or manage your keys.
36
+
-**Integration with Azure Key Vault:** The control plane facilitates the integration of Azure NetApp Files with Azure Key Vault, where your customer-managed keys are stored. This integration ensures secure key storage and management.
37
+
-**Encryption operations:** For encryption and decryption operations, the control plane handles Azure Key Vault requests to unwrap the account encryption key so your data is securely encrypted and decrypted as needed.
38
+
-**Auditing and monitoring:** The control plane provides capabilities for auditing and monitoring key usage. This helps you track who accessed your keys and when, enhancing security and compliance.
39
+
For more information, see[Configure customer-managed keys](configure-customer-managed-keys.md).
40
40
41
41
## Network Security Groups (NSG) Management
42
42
@@ -47,7 +47,7 @@ Managing network security groups (NSGs) in Azure NetApp Files relies on the cont
47
47
-**Integration with Azure Services:** The control plane facilitates the integration of NSGs with other Azure services, such as Azure Virtual Network and Azure Key Vault. This integration helps maintain a secure and compliant environment.
48
48
-**Monitoring and auditing:** The control plane provides tools for monitoring and auditing network traffic. You can track which rules are being applied and adjust them as needed to ensure optimal security and performance.
49
49
-**Policy Enforcement:** By using the control plane, you can enforce network policies across your Azure environment. This includes applying custom policies to meet specific security requirements and ensuring consistent policy enforcement.
50
-
-
50
+
51
51
For more information, see [Guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md) and [Azure NSGs](../virtual-network/network-security-groups-overview.md).
52
52
53
53
## Routing management
@@ -56,41 +56,43 @@ The control plane enables the configuration of User-Defined Routes (UDRs) on the
56
56
57
57
For more information, see [Guidelines for Azure NetApp Files network planning](azure-network-files-netwrok-topologies.md) and the [UDR overview](../virtual-network/virtual-networks-udr-overview#user-defined.md).
58
58
59
-
60
59
## Resource lock management
61
60
62
61
Resource locking at the control plane layer ensures that your Azure NetApp Files resources are protected from accidental or malicious deletions and modifications. Locking is particularly important for maintaining the integrity and stability of your storage environment.
63
62
64
-
Resource locking protects subscriptions, resource groups, or resources from accidental or malicious user deletions and modifications. The lock overrides any user permissions. Unlike RBAC, management locks apply a restriction across _all_ users and roles. Take careful consideration when locking any necessary resources to prevent changes after all configuration is in place.
63
+
[Resource locking](../azure-resource-manager/management/lock-resources.md) protects subscriptions, resource groups, or resources from accidental or malicious user deletions and modifications. The lock overrides any user permissions. Unlike RBAC, management locks apply a restriction across _all_ users and roles. Take careful consideration when locking any necessary resources to prevent changes after all configuration is in place.
65
64
66
65
## Monitoring and audit logging
67
66
68
67
Monitoring, auditing and logging are critical for maintaining security and compliance in your Azure NetApp Files environment. The control plane logs events related to storage operations, providing a comprehensive record of activities. This allows administrators to monitor and detect any suspicious activity, investigate security incidents, and establish accountability.
69
68
70
69
### Monitoring capabilities
71
70
72
-
- Azure Activity og:
71
+
- Azure Activity log:
73
72
-**Function:** Provides insights into subscription-level events, such as resource modifications or virtual machine startups. These insights aid in tracking changes and identifying unauthorized activities. To understand how Activity log works, see [Azure Activity log](../azure-monitor/essentials/activity-log.md).
74
73
-**Use case:** Useful for auditing and compliance, ensuring that all actions within your Azure NetApp Files environment are logged and traceable.
75
-
- Azure NetApp Files Metrics:
76
-
o Function: Offers metrics on allocated storage, actual storage usage, volume IOPS, and latency. These metrics help you understand usage patterns and volume performance. For more information about Azure NetApp Files metrics, see Metrics for Azure NetApp Files.
77
-
o Use Case: Essential for performance tuning and capacity planning, allowing you to optimize your storage resources effectively.
78
-
- Azure Service Health:
79
-
o Function: Keeps you informed about the health of your Azure services, providing a personalized view of the status of your environment. For more information, see Azure Service Health dashboard documentation.
80
-
o Use Case: Helps you stay updated on planned maintenance and health advisories, ensuring minimal disruption to your operations.
81
-
- Audit Logging:
82
-
o Scope: The control plane logs all PUT, POST, and DELETE API operations against Azure NetApp Files. This includes actions such as creating snapshots, modifying volumes, and deleting resources. For more information, see Azure activity logs supported in Azure NetApp Files.
83
-
o Details Captured: Logs capture detailed information about each operation, including who performed the action, when it was performed, and what changes were made. This level of detail is crucial for auditing and forensic investigations. For a complete list of API operations, see Azure NetApp Files REST API.
84
-
Azure Policy
85
-
When you use Azure Policy, the control plane ensures that your policies are enforced consistently across your environment. This helps maintain compliance with organizational standards and regulatory requirements.
86
-
Azure Policy Integration
87
-
1. Enforcing Standards:
88
-
o Custom Policies: You can create custom Azure Policy definitions tailored to your specific needs for Azure NetApp Files. These policies can enforce rules such as ensuring certain configurations, restricting the use of insecure protocols, or mandating encryption. For more information about custom policy definitions, see Azure Policy definitions for Azure NetApp Files.
89
-
o Built-in Policies: Azure provides built-in policy definitions that you can use to enforce common standards. For example, you can restrict the creation of unsecure volumes or audit existing volumes to ensure they meet your security requirements. For more information about built-in policies, see Azure Policy definitions for Azure NetApp Files.
90
-
2. Policy Evaluation:
91
-
o Continuous Assessment: The control plane continuously evaluates your resources against the defined policies. If a resource does not comply, the control plane can take actions such as denying the creation of the resource, auditing it, or applying specific configurations.
92
-
o Real-Time Enforcement: Policies are enforced in real-time, ensuring that any non-compliant actions are immediately addressed. This helps maintain the integrity and security of your environment.
93
-
Next steps
74
+
- Azure NetApp Files metrics:
75
+
-**Function:** Azure NetApp Files offers metrics on allocated storage, actual storage usage, volume I/OPS, and latency. These metrics help you understand usage patterns and volume performance. For more information, see [Metrics for Azure NetApp Files](azure-netapp-files-metrics.md).
76
+
- **Use case:** Metrics are essential for performance tuning and capacity planning, allowing you to optimize your storage resources effectively.
77
+
- Azure Service Health:
78
+
-**Function:** Azure Service Health keeps you informed about the health of your Azure services, providing a personalized view of the status of your environment. For more information, see [Service Health portal classic experience overview](../service-health/service-health-overview.md).
79
+
-**Use case:** Azure Service Health helps you stay updated on planned maintenance and health advisories, ensuring minimal disruption to your operations.
80
+
- Audit Logging:
81
+
-**Scope:** The control plane logs all PUT, POST, and DELETE API operations against Azure NetApp Files. These logs include actions such as creating snapshots, modifying volumes, and deleting resources. For more information, see [Are Azure activity logs supported in Azure NetApp Files?](faq-security.md#are-azure-activity-logs-supported-on-azure-netapp-files)
82
+
-**Details:** Logs capture detailed information about each operation, including who performed the action, when it was performed, and what changes were made. This level of detail is crucial for auditing and forensic investigations. For a complete list of API operations, see [Azure NetApp Files REST API](/rest/api/netapp).
83
+
84
+
## Azure Policy
85
+
86
+
When you use Azure Policy, the control plane ensures that your policies are enforced consistently across your environment. Azure Policy helps maintain compliance with organizational standards and regulatory requirements.
87
+
88
+
### Azure Policy integration
89
+
90
+
***Enforcing standards:**
91
+
-**Custom policies:** You can create custom Azure Policy definitions tailored to your specific needs for Azure NetApp Files. These policies can enforce rules such as ensuring certain configurations, restricting the use of insecure protocols, or mandating encryption. For more information about custom policy definitions, see [Built-in policy definitions for Azure NetApp Files](azure-policy-definitions.md#custom-policy-definitions).
92
+
-**Built-in policies:** Azure provides built-in policy definitions that you can use to enforce common standards. For example, you can restrict the creation of unsecure volumes or audit existing volumes to ensure they meet your security requirements. For more information about built-in policies, see [Custom policy definitions for Azure NetApp Files](azure-policy-definitions.md#built-in-policy-definitions).
93
+
***Policy evaluation:**
94
+
***Continuous assessment:** The control plane continuously evaluates your resources against the defined policies. If a resource doesn't comply, the control plane can take actions such as denying resource creation, auditing it, or applying specific configurations.
95
+
-**Real-time enforcement:** Policies are enforced in real-time, ensuring any non-compliant actions are immediately addressed to maintain the integrity and security of your environment.
0 commit comments