Skip to content

Commit 1e7b011

Browse files
Merge pull request #292639 from mbender-ms/nsp-update-case
nsp - update capitalization
2 parents 4cb9692 + 22e5855 commit 1e7b011

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,25 @@
11
---
2-
title: What is Network Security Perimeter?
3-
description: Learn about the components of Network Security Perimeter, a feature that allows Azure PaaS resources to communicate within an explicit trusted boundary, or perimeter.
2+
title: What is a network security perimeter?
3+
description: Learn about the components of network security perimeter, a feature that allows Azure PaaS resources to communicate within an explicit trusted boundary, or perimeter.
44
author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-private-link
77
ms.topic: overview
8-
ms.date: 12/3/2024
8+
ms.date: 01/06/2025
99
ms.custom: references_regions, ignite-2024
1010
#CustomerIntent: As a network security administrator, I want to understand how to use Network Security Perimeter to control network access to Azure PaaS resources.
1111
---
1212

13-
# What is Network Security Perimeter?
13+
# What is a network security perimeter?
1414

15-
Network Security Perimeter allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Storage account and SQL Database server) that are deployed outside your organization’s virtual networks. It restricts public network access to PaaS resources within the perimeter; access can be exempted by using explicit access rules for public inbound and outbound.
15+
Network security perimeter allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Storage account and SQL Database server) that are deployed outside your organization’s virtual networks. It restricts public network access to PaaS resources within the perimeter; access can be exempted by using explicit access rules for public inbound and outbound.
1616

1717
For access patterns involving traffic from virtual networks to PaaS resources, see [What is Azure Private Link?](private-link-overview.md).
1818

19-
Features of Network Security Perimeter include:
19+
Features of a network security perimeter include:
2020

21-
- Resource to resource access communication within perimeter members, preventing data exfiltration to non-authorized destinations.
22-
- Manage external public access with explicit rules for PaaS resources associated with the perimeter.
21+
- Resource to resource access communication within perimeter members, preventing data exfiltration to nonauthorized destinations.
22+
- External public access management with explicit rules for PaaS resources associated with the perimeter.
2323
- Access logs for audit and compliance.
2424
- Unified experience across PaaS resources.
2525

@@ -29,7 +29,7 @@ Features of Network Security Perimeter include:
2929

3030
[!INCLUDE [network-security-perimeter-preview-message](../../includes/network-security-perimeter-preview-message.md)]
3131

32-
## Components of Network Security Perimeter
32+
## Components of a network security perimeter
3333

3434
A network security perimeter includes the following components:
3535

@@ -42,7 +42,7 @@ A network security perimeter includes the following components:
4242
| **Diagnostics settings** | Extension resource hosted by Microsoft Insights to collect logs & metrics for all resources in the perimeter. |
4343

4444
> [!NOTE]
45-
> For organizational and informational safety, it is advised not to include any personally identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
45+
> For organizational and informational safety, don't include any personally identifiable or sensitive data in the network security perimeter rules or other network security perimeter configurations.
4646
4747
## Network security perimeter properties
4848

@@ -66,7 +66,7 @@ Administrators add PaaS resources to a perimeter by creating resource associatio
6666

6767
Learn more on transitioning from learning mode to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
6868

69-
## Why use Network Security Perimeter?
69+
## Why use a network security perimeter?
7070

7171
Network security perimeter provides a secure perimeter for communication of PaaS services deployed outside the virtual network. It allows you to control network access to Azure PaaS resources. Some of the common use cases include:
7272

@@ -78,13 +78,13 @@ Network security perimeter provides a secure perimeter for communication of PaaS
7878
- Allow private endpoint traffic without other access rules.
7979

8080

81-
## How does Network Security Perimeter work?
81+
## How does a network security perimeter work?
8282

8383
When a network security perimeter is created and the PaaS resources are associated with the perimeter in enforced mode, all public traffic is denied by default thus preventing data exfiltration outside the perimeter.
8484

8585
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using Network and Identity attributes of the client such as source IP addresses, subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
8686

87-
For example, upon creating a network security perimeter and associating a set of PaaS resources like Azure Key Vault and SQL DB in enforced mode, with the perimeter, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles may also be created to group PaaS resources with similar set of inbound and outbound access requirements.
87+
For example, upon creating a network security perimeter and associating a set of PaaS resources with the perimeter like Azure Key Vault and SQL DB in enforced mode, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles can be created to group PaaS resources with similar set of inbound and outbound access requirements.
8888

8989
## Onboarded private link resources
9090
A network security perimeter-aware private link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private link resources are as follows:
@@ -101,7 +101,7 @@ A network security perimeter-aware private link resource is a PaaS resource that
101101

102102
> [!NOTE]
103103
>
104-
## Limitations of network security perimeter
104+
## Limitations of a network security perimeter
105105

106106
### Regional limitations
107107

0 commit comments

Comments
 (0)