Remediation
From Azure Portalβ
Create and associate PaaS resources with a new network security perimeter:
- Go to
Network Security Perimeters. - Click
+ Create. - Select a
SubscriptionandResource group, provide aName, select aRegion, and provide aProfile name. - Click
Next. - Click
+ Add. - Check the box next to a PaaS resource to associate it with the network security perimeter.
- Click
Select. - Click
Next. - Configure appropriate
Inbound access rulesfor your organization. - Click
Next. - Configure appropriate
Outbound access rulesfor your organization. - Click
Review + create. - Click
Create.
Associate PaaS resources with an existing network security perimeter:
-
Go to
Network Security Perimeters. -
Click the name of a network security perimeter.
-
Under
Settings, clickAssociated resources. -
Click
+ Add. -
Select
Associate resources with a new profileorAssociate resources with an existing profile. -
To associate resources with a new profile:
- Provide a
Name. - Click
Next. - Click
+ Add. - Check the box next to a PaaS resource to associate it with the network security perimeter.
- Click
Select. - Click
Next. - Configure appropriate
Inbound access rulesfor your organization. - Click
Next. - Configure appropriate
Outbound access rulesfor your organization. - Click
Review + create. - Click
Create.
- Provide a
-
To associate resources with an existing profile:
- Next to
Profile, clickSelectto display the drop-down menu. - Select a profile.
- Click
+ Add. - Check the box next to a PaaS resource to associate it with the network security perimeter.
- Click
Select. - Click
Associate.
- Next to
From Azure CLIβ
Use az network perimeter profile list or az network perimeter profile create to list existing or create a new network security perimeter profile.
For each PaaS resource requiring association with a network security perimeter, run the following command:
az network perimeter association create --resource-group <resource-group> --perimeter-name <network-security-perimeter> --association-name <association> --private-link-resource "{id:<paas-resource-id>}" --profile "{<profile-id>}"