You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/data-plane-security.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Azure NetApp Files secures network attached storage (NAS) data through permissio
23
23
24
24
Securing your NAS data in Azure NetApp Files involves managing permissions effectively. Permissions are categorized into two main types:
25
25
26
-
***Share Access Permissions**: These control who can mount a NAS volume and basic permissions for read/write.
26
+
***Share access permissions**: These permissions control who can mount a NAS volume and basic permissions for read/write.
27
27
- NFS exports: Uses IP addresses or host names to control access.
28
28
- SMB shares: Uses user and group access control lists (ACLs).
29
29
@@ -44,12 +44,12 @@ Securing your NAS data in Azure NetApp Files involves managing permissions effec
44
44
- Access is controlled via user and group ACLs.
45
45
- Permissions can include read, change, and full control.
46
46
47
-
For a detailed understanding of share access permissions, see [Understand NAS share permissions](network-attached-storage-permissions.md).
47
+
For more information, see [Understand NAS share permissions](network-attached-storage-permissions.md).
48
48
49
49
#### File access permissions
50
50
51
51
**SMB file permissions:**
52
-
- Attributes include read, write, delete, change permissions, and take ownership and more granular permissions supported by Windows. See the links below for details.
52
+
- Attributes include read, write, delete, change permissions, and take ownership and more granular permissions supported by Windows.
53
53
- Permissions can be inherited from parent folders to child objects.
54
54
55
55
**NFS file permissions:**
@@ -83,7 +83,7 @@ For more details on permission inheritance, see:
83
83
84
84
## Data encryption in transit
85
85
86
-
Azure NetApp Files encryption in transit refers to the protection of data as it moves between your client and the Azure NetApp Files service. This ensures that data is secure and cannot be intercepted or read by unauthorized parties during transmission.
86
+
Azure NetApp Files encryption in transit refers to the protection of data as it moves between your client and the Azure NetApp Files service. Encryption ensures that data is secure and can't be intercepted or read by unauthorized parties during transmission.
87
87
88
88
### Protocols and encryption methods
89
89
@@ -103,7 +103,7 @@ For more information on SMB encryption, see [Understand data encryption](underst
103
103
104
104
## Data Encryption at rest
105
105
106
-
Encryption at rest protects your data while it;s stored on disk, ensuring that even if the physical storage media is accessed by unauthorized individuals, the data remains unreadable without the proper decryption keys.
106
+
Encryption at rest protects your data while it's stored on disk. Even if the physical storage media is accessed by unauthorized individuals, the data remains unreadable without the proper decryption keys.
107
107
108
108
There are two types of encryption at rest in Azure NetApp Files:
109
109
@@ -157,7 +157,7 @@ NSGs are collections of security rules that govern inbound and outbound traffic
157
157
-**Segmentation:** By applying NSGs to the subnets housing your Azure NetApp Files volumes, you can segment and isolate network traffic. Segmentation effectively reduces the attack surface and enhances overall security.
158
158
-**Monitoring and logging:** NSGs offer monitoring and logging capabilities through Network Security Group Flow Logs. These logs are critical for tracking traffic patterns, detecting potential security threats, and ensuring compliance with security policies.
159
159
160
-
For further details, see [Network Security Groups](../virtual-network/security-overview.md) and [What is a private endpoint?](../private-link/private-endpoint-overview.md)
160
+
For more information, see [Network Security Groups](../virtual-network/security-overview.md) and [What is a private endpoint?](../private-link/private-endpoint-overview.md)
0 commit comments