-
Notifications
You must be signed in to change notification settings - Fork 54
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #852 from MicrosoftDocs/main
11/19/2024 AM Publish
- Loading branch information
Showing
43 changed files
with
583 additions
and
320 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
--- | ||
title: Configure Network Security Perimeter for an Azure Cosmos DB account | ||
description: Learn how to secure your Cosmos DB account using Network Service Perimeter. | ||
ms.service: azure-cosmos-db | ||
ms.topic: how-to | ||
ms.date: 11/20/2024 | ||
ms.author: iriaosara | ||
author: iriaosara | ||
--- | ||
|
||
# Configure Network Security Perimeter for an Azure Cosmos DB account | ||
[!INCLUDE[NoSQL](includes/appliesto-nosql.md)] | ||
|
||
This article explains how to configure Network Security Perimeter on your Azure Cosmos DB account. | ||
|
||
> [!IMPORTANT] | ||
> Network Security Perimeter is in public preview. | ||
> This feature is provided without a service level agreement. | ||
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). | ||
## Feature overview | ||
Network administrators can define a network isolation boundary for their PaaS services, which allows communication between their Azure Cosmos DB account and Keyvault, SQL, and other services using Azure Network Security Perimeter. Securing public access on Azure Service can be accomplished in several ways: | ||
|
||
- Securing inbound connections: Restrict public exposure of your Azure Cosmos DB account by explicitly granting ingress access to resources inside the perimeter. By default, access from unauthorized networks is denied, and access from private endpoints into the perimeter or resources in a subscription can be configured. | ||
- Securing service-to-service communication: All resources inside the perimeter can communicate with any other resources within the perimeter, preventing data exfiltration. | ||
- Securing outbound connections: If Network Security Perimeter doesn't manage the destination tenant, it blocks access when attempting to copy data from one tenant to another. Access is granted based on FQDN or access from other network perimeters; all other access attempts are denied. | ||
|
||
:::image type="content" source="./media/network-service-perimeter/nsp-overview.png" alt-text="Screenshot showing network service perimeter."::: | ||
|
||
All of these communications are taken care of automatically once Network Security Perimeter is set up, and users don't have to manage them. Instead of setting up a private endpoint for each resource to enable communication or configure virtual network, Network Security Perimeter at the top level enables this functionality. | ||
|
||
> [!NOTE] | ||
> Azure Network security perimeter complements what we currently have in place today, including private endpoint, which allows access to a private resource within the perimeter, and VNet injection, which enables managed VNet offerings to access resources within the perimeter. | ||
> We currently do not support the combination of network security perimeter, customer-managed keys (CMK), and log store features. If you need to perform restores on a CMK with a network security perimeter account, you'll temporarily need to relax the perimeter settings in the key vault to allow your Cosmos DB account access to the key. | ||
## Getting started | ||
> [!IMPORTANT] | ||
> Before setting up a network security perimeter [create a managed identity in Azure](./how-to-setup-managed-identity.md#add-a-user-assigned-identity). | ||
* In the Azure portal, search for **network security perimeters** in the resource list and select **Create +**. | ||
* From the list of resources, select the resources that you want to associate with the perimeter. | ||
* Add an inbound access rule, the source type can be either an IP address or a subscription. | ||
* Add outbound access rules to allow resources inside the perimeter to connect to the internet and resources outside of the perimeter. | ||
|
||
In cases where you have existing Azure Cosmos DB account and looking to add security perimeter: | ||
* Select **Networking** from the **Settings** | ||
|
||
:::image type="content" source="./media/network-service-perimeter/add-nsp.png" alt-text="Screenshot showing how to add NSP to an Azure resource."::: | ||
|
||
* Then select **Associate NSP** to associate this resource with your network security perimeter to enable communication with other Azure resources in the same perimeter while restricting public access to only allow the connections you specify. | ||
|
||
## Next steps | ||
|
||
* Overview of [network service perimeter](https://aka.ms/networksecurityperimeter) | ||
* Learn to monitor with [diagnostic logs in network security perimeter](https://aka.ms/networksecurityperimeter) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.