Skip to content

Commit 498a096

Browse files
author
Michael Bender
committed
final updates from all docs + acrolinx
1 parent 3585281 commit 498a096

6 files changed

+33
-54
lines changed

articles/private-link/create-network-security-perimeter-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ In this step, you create and update network security perimeter access rules with
180180
181181
```
182182
183-
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
183+
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
184184
185185
## Delete all resources
186186

articles/private-link/create-network-security-perimeter-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 11/04/2024
1111

1212
# Quickstart: Create a network security perimeter - Azure PowerShell
1313

14-
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resources association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
14+
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
1515

1616
[!INCLUDE [network-security-perimeter-preview-message](../../includes/network-security-perimeter-preview-message.md)]
1717

@@ -201,7 +201,7 @@ To delete a network security perimeter, use the following commands:
201201
```azurepowershell-interactive
202202
203203
# Retrieve the network security perimeter and place it in a variable
204-
$nsp= Get-AzNetworkSecurityPerimeter -Name demo-nsp -ResourceGroupName $rg.name
204+
$nsp= Get-AzNetworkSecurityPerimeter -Name demo-nsp -ResourceGroupName $rg.Params.Name
205205
206206
# Delete the network security perimeter and all associated resources
207207
$removeNsp = @{

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: references_regions
1212

1313
# What is Network Security Perimeter?
1414

15-
Network Security Perimeter allows administrators to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and SQL Database) that are deployed outside virtual networks. It restricts communication to resources within the perimeter, and it allows non-perimeter public traffic through inbound and outbound access rules.
15+
Azure Network Security Perimeter allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Storage and SQL Database) that are deployed outside your organization’s virtual networks. It restricts public network access to PaaS resources outside of the perimeter, access can be exempted by using explicit access rules for public inbound and outbound.
1616

1717
For access patterns involving traffic from virtual networks to PaaS resources, see [What is Azure Private Link?](private-link-overview.md).
1818

@@ -35,9 +35,9 @@ A network security perimeter includes the following components:
3535
|---------------------|------------------------------------------------------------------------------------------------------------|
3636
| **Network security perimeter** | Top level resource defining logical network boundary to secure PaaS resources. |
3737
| **Profile** | Collection of access rules that apply on resources associated with the profile. |
38-
| **Access Rule**| Inbound and outbound rules for resources in a perimeter to allow access outside the perimeter. |
39-
| **ResourceAssociation** | Perimeter membership for a PaaS resource. |
40-
| **DiagnosticsSettings** | Extension resource hosted by Microsoft. Insights to collect logs & metrics for all resources in the perimeter. |
38+
| **Access rule**| Inbound and outbound rules for resources in a perimeter to allow access outside the perimeter. |
39+
| **Resource association** | Perimeter membership for a PaaS resource. |
40+
| **Diagnostics settings** | Extension resource hosted by Microsoft Insights to collect logs & metrics for all resources in the perimeter. |
4141

4242
> [!NOTE]
4343
> For organizational and informational safety, it is advised not to include any personally identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
@@ -80,17 +80,17 @@ Network security perimeter provides a secure perimeter for communication of PaaS
8080

8181
When a network security perimeter is created and the PaaS resources are associated with the perimeter, all public traffic is denied by default. Thus preventing data exfiltration outside the perimeter.
8282

83-
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using Network and Identity attributes of the client such as source IP addresses, subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
83+
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using network and identity attributes of the client such as source IP addresses and subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
8484

8585
For example, when creating a network security perimeter and associating a set of PaaS resources, like Azure Key Vault and SQL DB, with the perimeter, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles can also be created to group PaaS resources with similar set of inbound and outbound access requirements.
8686

8787

88-
## Onboarded private-link resources
89-
A Network Security Perimeter aware private-link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private-link resources are as follows:
88+
## Onboarded private link resources
89+
A network security perimeter-aware private link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private link resources are as follows:
9090

91-
| Private-link resource name | Resource type | Resources |
91+
| Private link resource name | Resource type | Resources |
9292
|---------------------------|---------------|-----------|
93-
| Azure Monitor | Microsoft.Insights/dataCollectionEndpoints<br>Microsoft.Insights/ScheduledQueryRules</br>Microsoft.Insights/actionGroups</br>Microsoft.OperationalInsights/workspaces | Log Analytics Workspace, Application Insights, Alerts, Notification Service |
93+
| Azure Monitor | Microsoft.Insights/dataCollectionEndpoints</br>Microsoft.Insights/ScheduledQueryRules</br>Microsoft.Insights/actionGroups</br>Microsoft.OperationalInsights/workspaces | Log Analytics Workspace, Application Insights, Alerts, Notification Service |
9494
| Azure AI Search | Microsoft.Search/searchServices | - |
9595
| Cosmos DB | Microsoft.DocumentDB/databaseAccounts | - |
9696
| Event Hubs | Microsoft.EventHub/namespaces | - |
@@ -99,12 +99,11 @@ A Network Security Perimeter aware private-link resource is a PaaS resource that
9999
| Storage | Microsoft.Storage/storageAccounts | - |
100100
| Event Grid | Microsoft.EventGrid/topics</br>Microsoft.EventGrid/domains | - |
101101

102-
103102
## Limitations of network security perimeter
104103

105104
### Regional limitations
106105

107-
Network security perimeter is currently available in all Azure public cloud regions. However, while enabling access logs for network security perimeter, consider the region availability of Azure monitor
106+
Network security perimeter is currently available in all Azure public cloud regions. However, while enabling access logs for network security perimeter, consider the region availability of Azure monitor.
108107

109108
> [!NOTE]
110109
> Though the network security perimeter can be created in any region, the Log analytics workspace to be associated with the network security perimeter needs to be located in one of the Azure Monitor supported regions.

articles/private-link/network-security-perimeter-role-based-access-control-requirements.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,16 @@ In this article, you learn about the Azure role-based access control (RBAC) perm
2424
| Microsoft.Network/networkSecurityPerimeters/read | Gets a network security perimeter |
2525
| Microsoft.Network/networkSecurityPerimeters/write | Creates or updates a network security perimeter |
2626
| Microsoft.Network/networkSecurityPerimeters/delete | Deletes a network security perimeter |
27-
| Microsoft.Network/locations/queryNetworkSecurityPerimeter/action | Queries network security perimeter by the perimeter guid |
28-
| Microsoft.Network/locations/perimeterAssociableResourceTypes/read | Gets network security perimeter associable resources |
27+
| Microsoft.Network/locations/perimeterAssociableResourceTypes/read | Gets network security perimeter associable resources |
2928

3029

3130
### Network security perimeter profile permissions
3231

3332
| Action | Description |
3433
| --- | --- |
35-
| Microsoft.Network/networkSecurityPerimeters/profiles/read | Gets a Network security perimeter Profile |
36-
| Microsoft.Network/networkSecurityPerimeters/profiles/write | Creates or updates a Network security perimeter Profile |
37-
| Microsoft.Network/networkSecurityPerimeters/profiles/delete | Deletes a Network security perimeter Profile |
34+
| Microsoft.Network/networkSecurityPerimeters/profiles/read | Gets a network security perimeter profile |
35+
| Microsoft.Network/networkSecurityPerimeters/profiles/write | Creates or updates a network security perimeter profile |
36+
| Microsoft.Network/networkSecurityPerimeters/profiles/delete | Deletes a network security perimeter profile |
3837

3938
### Network security perimeter access rule permissions
4039

@@ -43,7 +42,7 @@ In this article, you learn about the Azure role-based access control (RBAC) perm
4342
| Microsoft.Network/networkSecurityPerimeters/profiles/accessRules/read | Gets a network security perimeter access rule. |
4443
| Microsoft.Network/networkSecurityPerimeters/profiles/accessRules/write | Creates or updates a network security perimeter access rule. |
4544
| Microsoft.Network/networkSecurityPerimeters/profiles/accessRules/delete | Deletes a network security perimeter access rule. |
46-
| Microsoft.Resources/subscriptions/joinPerimeterRule/action | User must have *subscription contributor* role over the subscription. |
45+
| Microsoft.Resources/subscriptions/joinPerimeterRule/action | User must have *microsoft.resources/subscriptions/joinperimeterrule/action* role over the subscription |
4746

4847
> [!NOTE]
4948
> User must have *subscription contributor* role to create/update subscription-based access rule.
@@ -56,14 +55,13 @@ In this article, you learn about the Azure role-based access control (RBAC) perm
5655
| Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write | Creates or updates a network security perimeter resource association |
5756
| Microsoft.Network/networkSecurityPerimeters/profiles/join/action | Joins a network security perimeter profile. Linked access check is performed while associating the resource |
5857
| Microsoft.Network/networkSecurityPerimeters/resourceAssociations/delete | Deletes a network security perimeter resource association |
59-
| Microsoft.Network/networkSecurityPerimeters/resourceAssociationProxies/read | Gets a network security perimeter resource association proxy |
6058

6159
> [!NOTE]
6260
> To create or update an association, the following permissions are required to exist:
6361
>
64-
> - `Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write` is required at the network security perimeter resource.
65-
> - `Microsoft.Network/networkSecurityPerimeters/profiles/join/action` on the profile.
66-
> - `Microsoft.Network/networkSecurityPerimeters/joinPerimeter/action` on the respective PaaS resource.
62+
> - *Microsoft.Network/networkSecurityPerimeters/resourceAssociations/write* is required at the network security perimeter resource.
63+
> - *Microsoft.Network/networkSecurityPerimeters/profiles/join/action* is required on the profile.
64+
> - *Microsoft.Network/networkSecurityPerimeters/joinPerimeter/action* is required on the respective PaaS resource.
6765
6866
## Next steps
6967

0 commit comments

Comments
 (0)