top of page
Search

Azure Network Security Perimeter: a real game changer around PAAS services

  • didierestevespro
  • May 5
  • 3 min read

Azure Network Security Perimeter (PREVIEW) in action and use cases


Original link on Medium : Link


Microsoft Ignite has just launched an interesting new feature called Network security perimeter or NSP.


Ok cool…what it is important or what´s new?


Well, as an Azure architect I see several advantages but first things first : what is NSP?

ree

NSP is a logical network boundary for PAAS resources: you can see it like a Network Security Group for PAAS resources. The official definition is “NSP allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Storage account and SQL Database server) that are deployed outside your organization’s virtual networks. It restricts public network access to PaaS resources within the perimeter; access can be exempted by using explicit access rules for public inbound and outbound”.


Official schema of NSP
Official schema of NSP

I don´t want to explain in detail all the component: the link to the official documentation already do it very well. Today, the only services that are addressed are:

  • Azure Monitor

  • Azure AI Search

  • Cosmos DB

  • Event Hubs

  • Key vault

  • SQL database

  • Azure storage account

However, I want to share my vision about the practical uses cases as Azure architect when it comes to engaging a discussion to your customers.


Currently is limited in public preview, only address a few PAAS services and it allows you:

  • to add a deny data exfiltrations of your data with a central vision

  • adds an extra layer between your PAAS resources and the external boundaries of your organization

  • enable diagnostic logs for auditing and compliancy


1. Prevent data exfiltration more easily


Microsoft says that NSP prevents data exfiltration: it limits an attacker to receive sensitive data that are on a storage account or a Cosmos DB to go outside the boundaries of the company.


Ok great but wait a minute: data exfiltration can already be disabled so what is it new?

Right, but keep in mind that NSP can facilitate security management for large scale organizations. Imagine that you have more than one hundred or storage accounts that you want to prevent public data access. You have to edit all those storage accounts one by one by writing a script. I see it as a central Control Plane where you can control on one single place your services: governance will be easier.


With NSP, you create a profile and add this profile to the storage account. It All your security controls are now on one single unified point and the modification that you bring will be enabled immediately to all resources attached to it. Governance and administration will be easier.


In addition, you can add monitoring and auditing so now you can easily send all logs to a logs analytics workspace for you auditing purposes.


Configuration of Inbound access rules
Configuration of Inbound access rules

2. Use a “What-if” for testing mode before restricting the access


Another cool feature is that you have two modes: learning mode and Enforced modes.

Just like an Azure policy assignment, you can configure NSP, create the inbound / outbound rules and assign profiles to your resources, and before limiting all at once, just choose the learning mode to see the logs, test and do whatever you want before choosing to set the real mode: Enforced mode.


Like this you can have a smooth transition and prepare the deployment at large scale without any big bang.


Another thing is that if you already have private endpoints configured : it’s ok and it will continue to working as well. In other words private endpoint and NSP can live together side by side.


Associated resources of a NSP (link) with the Access mode
Associated resources of a NSP (link) with the Access mode

3. Create a boundary at a subscription level


You can create inbound access rules to allow all traffic coming from selected subscription to comes in your PAAS resources.


For example, you can allow access to all virtual machines on a subscription to Azure Cosmos DB without configuring IP rules on a firewall or selecting the networks (but you have to use managed identity). It makes administration easier because you don´t have to edit the Cosmos DB more often.


ree

4. In conclusion


NSP can be a real game changer in the months to come. I strongly encourage the teams to engage in discussions for redesigning security or network architecture because it will be easier to secure resources or reduce the time for configuring all the outbound connectivity at a large scale.


New use cases can be addressed: for example, Azure Search AI can be blocked for preventing data exfiltration. I know that it can be a blocker when comes the time to decide for using those services, so new doors will be opened!


Today I didn’t see a release date when it will become GA so… stay tuned!

 
 
 

Comments


© 2025 by Didier Esteves.

Follow / Reach Me

  • LinkedIn
  • Medium
bottom of page