You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-security-info.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,33 +16,33 @@ This security information applies to Microsoft Azure HPC Cache. It addresses com
16
16
17
17
The HPC Cache Service is only accessible through your private virtual network. Microsoft cannot access your virtual network.
18
18
19
-
More information about connecting private networks is available [here](/security/benchmark/azure/baselines/hpc-cache-security-baseline.md).
19
+
Learn more about [connecting private networks](/security/benchmark/azure/baselines/hpc-cache-security-baseline.md).
20
20
21
21
## Network infrastructure requirements
22
22
23
23
Your network needs a dedicated subnet for the Azure HPC Cache, DNS support so the cache can access storage, and access from the subnet to additional Microsoft Azure infrastructure services like NTP servers and the Azure Queue Storage service.
24
24
25
-
More information about network infrastructure requirements is available [here](hpc-cache-prerequisites.md#network-infrastructure).
25
+
Learn more about [network infrastructure requirements](hpc-cache-prerequisites.md#network-infrastructure).
26
26
27
27
## Access to NFS storage
28
28
29
29
The Azure HPC Cache needs specific NFS configurations like outbound NFS port access to on-premises storage.
30
30
31
-
For details about configuring your NFS storage to work with Azure HPC Cache, refer to [this article](hpc-cache-prerequisites.md#nfs-storage-requirements).
31
+
Learn more about [configuring your NFS storage](hpc-cache-prerequisites.md#nfs-storage-requirements) to work with Azure HPC Cache.
32
32
33
33
## Encryption
34
34
35
35
HPC Cache data is encrypted at rest. Encryption keys may be Azure-managed or customer-managed.
36
36
37
-
For more information about implementing customer-managed keys for encrypting data, see [this article](customer-keys.md).
37
+
Learn more about [implementing customer-managed keys](customer-keys.md).
38
38
39
39
HPC Cache only supports AUTH_SYS security for NFSv3 so it’s not possible to encrypt NFS traffic between clients and the cache. If, however, data is traveling over ExpressRoute, you could [tunnel traffic with IPSEC](../virtual-wan/vpn-over-expressroute.md) for in-transit traffic encryption.
40
40
41
41
## Access policies based on IP address
42
42
43
43
You can set CIDR blocks to allow the following access control policies: none, read, read/write, and squashed.
44
44
45
-
See the [Access policies](access-policies.md) page for more information about configuring access based on IP addresses.
45
+
Learn more how to [configure access policies](access-policies.md) based on IP addresses.
46
46
47
47
You can also optionally configure network security groups (NSGs) to control inbound access to the HPC Cache subnet. This restricts which IP addresses are routed to the HPC Cache subnet.
0 commit comments