You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/concept-security-admins.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,17 +74,17 @@ Note that security admin rules don't depend on NSGs in order to exist. This mean
74
74
75
75
With NSGs alone, widespread enforcement on VNets across several applications, teams, or even entire organizations can be tricky. Often there’s a balancing act between attempts at centralized enforcement across an organization and handing over granular, flexible control to teams. Let’s look at a few common models of security management without security admin rules, and their pros and cons:
76
76
77
-
Model 1: NSGs are managed by a central governance team.
78
-
- Pros – The central governance team can enforce important security rules.
79
-
- Cons – Operational overhead is high as admins need to manage each NSG, as the number of NSGs increases, the burden increases.
77
+
-Model 1: NSGs are managed by a central governance team.
78
+
- Pros – The central governance team can enforce important security rules.
79
+
- Cons – Operational overhead is high as admins need to manage each NSG, as the number of NSGs increases, the burden increases.
80
80
81
-
Model 2: NSGs are managed by individual teams.
82
-
- Pros – The individual team has flexible control in tailoring security rules based on their service requirements.
83
-
- Cons – The central governance team can't enforce critical security rules, such as blocking risky ports. Individual team might also misconfigure or forget to attach NSGs, leading vulnerability exposures.
81
+
-Model 2: NSGs are managed by individual teams.
82
+
- Pros – The individual team has flexible control in tailoring security rules based on their service requirements.
83
+
- Cons – The central governance team can't enforce critical security rules, such as blocking risky ports. Individual team might also misconfigure or forget to attach NSGs, leading vulnerability exposures.
84
84
85
-
Model 3: NSGs are managed by individual teams, but NSGs are created using Azure Policy to have standard rules. Modifying these rules would trigger audit notifications.
86
-
- Pros – The individual team has flexible control in tailoring security rules. The central governance team can create standard security rules and receive notifications if these are modified.
87
-
- Cons – The central governance team still can't enforce the standard security rules, since NSG owners in teams can still modify them. Notifications would also be overwhelming to manage.
85
+
-Model 3: NSGs are managed by individual teams, but NSGs are created using Azure Policy to have standard rules. Modifying these rules would trigger audit notifications.
86
+
- Pros – The individual team has flexible control in tailoring security rules. The central governance team can create standard security rules and receive notifications if these are modified.
87
+
- Cons – The central governance team still can't enforce the standard security rules, since NSG owners in teams can still modify them. Notifications would also be overwhelming to manage.
88
88
89
89
Security admin rules aim to eliminate this sliding scale between enforcement and flexibility altogether by consolidating the pros of each of these models while reducing the cons of each. Central governance teams establish guard rails through security admin rules, while still leaving room for individual teams to flexibly pinpoint security as needed through NSG rules. Security admin rules aren't meant to override NSG rules, but rather interact in different ways depending on the type of action specified in the security admin rule. We’ll explore these interactions after we discuss the immense scaling benefits of security admin rules.
90
90
@@ -105,6 +105,7 @@ Security rule priority is determined by an integer between 0 and 99. The lower t
105
105
#### <aname = "action"></a>Action
106
106
107
107
You can define one of three actions for a security rule:
108
+
108
109
| Action | Description |
109
110
| -------------- | --- |
110
111
|**Allow**| Allows traffic on the specific port, protocol, and source/destination IP prefixes in the specified direction. |
0 commit comments