Description
Azure Network Security Perimeter creates a logical boundary around Azure platform-as-a-service (PaaS) resources outside of virtual networks. By default, the network security perimeter denies public access to associated PaaS resources, with the ability to define explicit rules for inbound and outbound traffic.
While an automated assessment procedure exists for this recommendation, the assessment status remains manual. Determining appropriate network security perimeter profiles and resource assignments depends on the context and requirements of each organization and environment.
Rationaleβ
Network security perimeter denies public access to PaaS resources, reducing exposure and mitigating data exfiltration risks.
Impactβ
Implementation requires administrative effort to configure and maintain network security perimeter profiles and resource assignments. Azure does not list any additional charges for using network security perimeters.
Auditβ
From Azure Portalβ
- Go to
Resource groups. - Click the name of a resource group.
- Take note of PaaS resources.
- Go to
Network Security Perimeters. - Click the name of a network security perimeter.
- Under
Settings, clickAssociated resources. - Take note of the associated resources.
- Repeat steps 1-7 and ensure each PaaS resource is associated with a network security perimeter.
From Azure CLIβ
Run the following command to list resource groups:
az group list
For each resource group, run the following command to list resources:
az resource list --resource-group <resource-group>
Take note of PaaS resources.
For each resource group, run the following command to list network security perimeters:
az network perimeter list --resource-group <resource-group>
For each network security perimeter, run the following command to list resources:
az network perimeter association list --resource-group <resource-group> --perimeter-name <network-security-perimeter>
Ensure each PaaS resource is associated with a network security perimeter.
Default Valueβ
PaaS resources are not associated with a network security perimeter by default.
Referencesβ
- https://learn.microsoft.com/en-us/azure/private-link/network-security-perimeter-concepts
- https://learn.microsoft.com/en-us/azure/private-link/create-network-security-perimeter-portal
- https://learn.microsoft.com/en-us/cli/azure/group
- https://learn.microsoft.com/en-us/cli/azure/resource
- https://learn.microsoft.com/en-us/cli/azure/network/perimeter
Additional Informationβ
The current list of resources that can be associated with a network security perimeter are as follows:
- Azure Monitor
- Azure AI Search
- Cosmos DB
- Event Hubs
- Key Vault
- SQL DB
- Storage
- Azure OpenAI Service
While network security perimeter is generally available, Cosmos DB, SQL DB, and Azure OpenAI Service are in public preview.