You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,24 @@
1
1
---
2
2
title: What is a network security perimeter?
3
3
titleSuffix: Azure Private Link
4
-
description: Learn about the components of network security perimeter, a feature that allows Azure PaaS resources to communicate within an explicit trusted boundary, or perimeter.
4
+
description: Learn how Azure Network Security Perimeter secures PaaS resources with logical network boundaries. Control public access, prevent data exfiltration, and manage access rules for Storage, SQL Database, and Key Vault.
5
5
author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: overview
9
-
ms.date: 05/16/2025
10
-
ms.custom: references_regions, ignite-2024
11
-
#CustomerIntent: As a network security administrator, I want to understand how to use Network Security Perimeter to control network access to Azure PaaS resources.
12
-
# Customer intent: As a network security administrator, I want to implement a network security perimeter for Azure PaaS resources, so that I can ensure secure communication and control access within a defined logical boundary while preventing unauthorized public access.
9
+
ms.date: 07/29/2025
10
+
ms.custom:
11
+
- references_regions, ignite-2024
12
+
- ai-gen-docs-bap
13
+
- ai-gen-description
14
+
- ai-seo-date:07/29/2025
13
15
---
14
16
15
17
# What is a network security perimeter?
16
18
17
-
Network security perimeter allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Storage account and SQL Database server) that are deployed outside your organization’s virtual networks. It restricts public network access to PaaS resources within the perimeter; access can be exempted by using explicit access rules for public inbound and outbound.
19
+
Azure Network Security Perimeter creates logical network boundaries around your platform-as-a-service (PaaS) resources that are deployed outside your virtual networks. Network security perimeter helps you control public network access to resources like Azure Storage accounts and SQL Database servers by establishing a secure perimeter.
20
+
21
+
By default, network security perimeter restricts public access to PaaS resources within the boundary. You can grant exceptions through explicit access rules for inbound and outbound traffic. This approach helps prevent data exfiltration while maintaining necessary connectivity for your applications.
18
22
19
23
For access patterns involving traffic from virtual networks to PaaS resources, see [What is Azure Private Link?](private-link-overview.md).
20
24
@@ -25,7 +29,7 @@ Features of a network security perimeter include:
25
29
- Access logs for audit and compliance.
26
30
- Unified experience across PaaS resources.
27
31
28
-
:::image type="content" source="media/network-security-perimeter-concepts/network-security-perimeter-overview.png" alt-text="Diagram of securing a service with network security perimeter." lightbox="media/network-security-perimeter-concepts/network-security-perimeter-overview-large.png":::
32
+
:::image type="content" source="media/network-security-perimeter-concepts/network-security-perimeter-overview.png" alt-text="Screenshot of a diagram showing the securing of a service with network security perimeter." lightbox="media/network-security-perimeter-concepts/network-security-perimeter-overview-large.png":::
@@ -61,7 +65,7 @@ Administrators add PaaS resources to a perimeter by creating resource associatio
61
65
|**Mode**|**Description**|
62
66
|----------------|--------|
63
67
|**Transition mode (formerly Learning mode)**| - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
64
-
|**Enforced mode**| - Must be set by the administrator.</br>- By default, all traffic except intraperimeter traffic is denied in this mode unless an *Allow* access rule exists. |
68
+
|**Enforced mode**| - Must be set by the administrator.</br>- By default, all traffic except intra-perimeter traffic is denied in this mode unless an *Allow* access rule exists. |
65
69
66
70
67
71
Learn more on move from transition mode (formerly learning mode) to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
@@ -87,6 +91,7 @@ Access rules can be used to approve public inbound and outbound traffic outside
87
91
For example, upon creating a network security perimeter and associating a set of PaaS resources with the perimeter like Azure Key Vault and SQL DB in enforced mode, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles can be created to group PaaS resources with similar set of inbound and outbound access requirements.
88
92
89
93
## Onboarded private link resources
94
+
90
95
A network security perimeter-aware private link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private link resources are as follows:
91
96
92
97
| Private link resource name | Resource type | Resources |
0 commit comments