You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.date: 11/04/2024
11
11
12
12
# Quickstart: Create a network security perimeter - Azure PowerShell
13
13
14
-
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resources association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
14
+
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.custom: references_regions
12
12
13
13
# What is Network Security Perimeter?
14
14
15
-
Network Security Perimeter allows administrators to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and SQL Database) that are deployed outside virtual networks. It restricts communication to resources within the perimeter, and it allows non-perimeter public traffic through inbound and outbound access rules.
15
+
Azure Network Security Perimeter allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and SQL Database) that are deployed outside your organization’s virtual networks. It restricts public network access to PaaS resources outside of the perimeter, access can be exempted by using explicit access rules for public inbound and outbound.
16
16
17
17
For access patterns involving traffic from virtual networks to PaaS resources, see [What is Azure Private Link?](private-link-overview.md).
18
18
@@ -35,9 +35,9 @@ A network security perimeter includes the following components:
|**Network security perimeter**| Top level resource defining logical network boundary to secure PaaS resources. |
37
37
|**Profile**| Collection of access rules that apply on resources associated with the profile. |
38
-
|**Access Rule**| Inbound and outbound rules for resources in a perimeter to allow access outside the perimeter. |
39
-
|**ResourceAssociation**| Perimeter membership for a PaaS resource. |
40
-
|**DiagnosticsSettings**| Extension resource hosted by Microsoft. Insights to collect logs & metrics for all resources in the perimeter. |
38
+
|**Access rule**| Inbound and outbound rules for resources in a perimeter to allow access outside the perimeter. |
39
+
|**Resource association**| Perimeter membership for a PaaS resource. |
40
+
|**Diagnostics settings**| Extension resource hosted by Microsoft Insights to collect logs & metrics for all resources in the perimeter. |
41
41
42
42
> [!NOTE]
43
43
> For organizational and informational safety, it is advised not to include any personally identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
@@ -80,17 +80,17 @@ Network security perimeter provides a secure perimeter for communication of PaaS
80
80
81
81
When a network security perimeter is created and the PaaS resources are associated with the perimeter, all public traffic is denied by default. Thus preventing data exfiltration outside the perimeter.
82
82
83
-
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using Network and Identity attributes of the client such as source IP addresses, subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
83
+
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using network and identity attributes of the client such as source IP addresses and subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
84
84
85
85
For example, when creating a network security perimeter and associating a set of PaaS resources, like Azure Key Vault and SQL DB, with the perimeter, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles can also be created to group PaaS resources with similar set of inbound and outbound access requirements.
86
86
87
87
88
-
## Onboarded private-link resources
89
-
A Network Security Perimeter aware private-link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private-link resources are as follows:
88
+
## Onboarded privatelink resources
89
+
A network security perimeter-aware privatelink resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded privatelink resources are as follows:
90
90
91
-
| Private-link resource name | Resource type | Resources |
91
+
| Privatelink resource name | Resource type | Resources |
Network security perimeter is currently available in all Azure public cloud regions. However, while enabling access logs for network security perimeter, consider the region availability of Azure monitor
106
+
Network security perimeter is currently available in all Azure public cloud regions. However, while enabling access logs for network security perimeter, consider the region availability of Azure monitor.
108
107
109
108
> [!NOTE]
110
109
> Though the network security perimeter can be created in any region, the Log analytics workspace to be associated with the network security perimeter needs to be located in one of the Azure Monitor supported regions.
| Microsoft.Resources/subscriptions/joinPerimeterRule/action | User must have *subscription contributor* role over the subscription.|
45
+
| Microsoft.Resources/subscriptions/joinPerimeterRule/action | User must have *microsoft.resources/subscriptions/joinperimeterrule/action* role over the subscription |
47
46
48
47
> [!NOTE]
49
48
> User must have *subscription contributor* role to create/update subscription-based access rule.
@@ -56,14 +55,13 @@ In this article, you learn about the Azure role-based access control (RBAC) perm
56
55
| Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write | Creates or updates a network security perimeter resource association |
57
56
| Microsoft.Network/networkSecurityPerimeters/profiles/join/action | Joins a network security perimeter profile. Linked access check is performed while associating the resource |
58
57
| Microsoft.Network/networkSecurityPerimeters/resourceAssociations/delete | Deletes a network security perimeter resource association |
59
-
| Microsoft.Network/networkSecurityPerimeters/resourceAssociationProxies/read | Gets a network security perimeter resource association proxy |
60
58
61
59
> [!NOTE]
62
60
> To create or update an association, the following permissions are required to exist:
63
61
>
64
-
> -`Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write` is required at the network security perimeter resource.
65
-
> -`Microsoft.Network/networkSecurityPerimeters/profiles/join/action` on the profile.
66
-
> -`Microsoft.Network/networkSecurityPerimeters/joinPerimeter/action` on the respective PaaS resource.
62
+
> -*Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write* is required at the network security perimeter resource.
63
+
> -*Microsoft.Network/networkSecurityPerimeters/profiles/join/action* is required on the profile.
64
+
> -*Microsoft.Network/networkSecurityPerimeters/joinPerimeter/action* is required on the respective PaaS resource.
0 commit comments