Skip to content

Commit e1aa6b6

Browse files
Add NSP article for Service Bus and update related docs
1 parent 82982c5 commit e1aa6b6

4 files changed

Lines changed: 44 additions & 14 deletions

File tree

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,7 @@ A network security perimeter-aware private link resource is a PaaS resource that
9696
| [Cosmos DB](/azure/cosmos-db/how-to-configure-nsp) | Microsoft.DocumentDB/databaseAccounts | - |
9797
| [Event Hubs](/azure/event-hubs/network-security-perimeter) | Microsoft.EventHub/namespaces | - |
9898
| [Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview) | Microsoft.KeyVault/vaults | - |
99+
| [Service Bus](/azure/service-bus-messaging/network-security-perimeter) | Microsoft.ServiceBus/namespaces | - |
99100
| [SQL DB](/azure/azure-sql/database/network-security-perimeter) | Microsoft.Sql/servers | - |
100101
| [Storage](/azure/storage/common/storage-network-security#network-secuirty-perimeter-preview) | Microsoft.Storage/storageAccounts | - |
101102
| [Azure OpenAI service](/azure/ai-services/openai/how-to/network-security-perimeter) | Microsoft.CognitiveServices | - |

articles/service-bus-messaging/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,8 @@
176176
href: ./security-controls-policy.md
177177
- name: Network security
178178
href: network-security.md
179+
- name: Network security perimeter
180+
href: network-security-perimeter.md
179181
- name: Integration with other services
180182
items:
181183
- name: Azure Service Bus and Azure Event Grid integration
Lines changed: 36 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Network Security Perimeter
33
titleSuffix: Azure Service Bus
4-
description: Overview of Network Security Perimeter feature for Service Bus
4+
description: Learn how to associate an Azure Service Bus namespace with a network security perimeter
55
ms.reviewer: spelluru
66
ms.date: 01/15/2026
77
author: EldertGrootenboer
@@ -11,26 +11,48 @@ ms.custom:
1111
---
1212

1313

14-
# Network Security Perimeter for Azure Service Bus
14+
# Network security perimeter for Azure Service Bus
1515

16-
[Azure Service Bus](./service-bus-messaging-overview.md) supports integration with [Network Security Perimeter](../private-link/network-security-perimeter-concepts.md).
16+
[Azure Service Bus](./service-bus-messaging-overview.md) supports integration with [network security perimeter](../private-link/network-security-perimeter-concepts.md).
1717

18-
The Network Security Perimeter safeguards network traffic between Azure Service Bus and other Platform as a Service (PaaS) offerings like Azure Key Vault. By confining communication solely to Azure resources within its boundaries, it blocks unauthorized attempts to access resources beyond its secure perimeter.
18+
Network security perimeter safeguards network traffic between Azure Service Bus and other Platform as a Service (PaaS) offerings like Azure Key Vault. By confining communication solely to Azure resources within its boundaries, it blocks unauthorized attempts to access resources beyond its secure perimeter.
19+
20+
With a network security perimeter:
21+
22+
- PaaS resources associated with a specific perimeter can, by default, only communicate with other PaaS resources within the same perimeter.
23+
- You can actively permit external inbound and outbound communication by setting explicit access rules.
24+
- [Diagnostic logs](../private-link/network-security-perimeter-diagnostic-logs.md) are enabled for PaaS resources within perimeter for audit and compliance.
1925

2026
Integrating Service Bus within this framework enhances messaging capabilities while ensuring robust security measures. This integration not only provides a reliable and scalable platform but also strengthens data protection strategies, mitigating risks associated with unauthorized access or data breaches.
2127

22-
Operating as a service under Azure Private Link, the Network Security Perimeter facilitates secure communication for PaaS services deployed outside the virtual network. It enables seamless interaction among PaaS services within the perimeter and facilitates communication with external resources through carefully configured access rules. Additionally, it supports outbound resources such as Azure Key Vault for customer-managed keys (CMK), further enhancing its versatility and utility in diverse cloud environments.
28+
Operating as a service under Azure Private Link, network security perimeter facilitates secure communication for PaaS services deployed outside the virtual network. It enables seamless interaction among PaaS services within the perimeter and facilitates communication with external resources through carefully configured access rules. Additionally, it supports outbound resources such as Azure Key Vault for customer-managed keys (CMK), further enhancing its versatility and utility in diverse cloud environments.
29+
30+
## Network security perimeter scenarios in Service Bus
31+
32+
Azure Service Bus supports scenarios that require access to other PaaS resources:
33+
34+
- **Customer-managed keys (CMK)** require communication with Azure Key Vault. For more information, see [Configure customer-managed keys for encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
2335

2436
> [!NOTE]
25-
> Network Security Perimeter doesn't support [Azure Service Bus Geo-Replication](./service-bus-geo-replication.md).
37+
> - Network security perimeter doesn't support [Azure Service Bus geo-replication](./service-bus-geo-replication.md).
38+
> - Network security perimeter rules don't govern private link traffic through [private endpoints](../private-link/private-endpoint-overview.md).
2639
27-
## Associate Service Bus with a Network Security Perimeter in the Azure portal
28-
1. Search for "Network Security Perimeter" in the portal search bar. Select **Create** to create the resource.
29-
1. Enter a name and region, and choose the subscription.
30-
1. Under the **Resources** section, select **Associate**. Navigate to the Service Bus namespace you want to add.
40+
## Create a network security perimeter
41+
42+
Create your own network security perimeter resource using [Azure portal](../private-link/create-network-security-perimeter-portal.md), [PowerShell](../private-link/create-network-security-perimeter-powershell.md), or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
43+
44+
## Associate Service Bus with a network security perimeter in the Azure portal
45+
46+
1. Go to your network security perimeter resource in the Azure portal.
47+
1. Select **Resources** from the left menu.
48+
1. Select **Associate** to add a new resource association.
49+
1. Search for and select the Service Bus namespace you want to add.
50+
1. Select a profile to associate with the namespace and select **Associate**.
3151

3252
## Related content
33-
- For an overview of [Network Security Perimeter](../private-link/network-security-perimeter-concepts.md)
34-
- For monitoring with [diagnostic logs in Network Security Perimeter](../private-link/network-security-perimeter-diagnostic-logs.md)
35-
- For other Service Bus security features, see [Network security for Azure Service Bus](./network-security.md)
36-
- For additional information on using private endpoints, see [Allow access to Azure Service Bus namespaces via private endpoints](./private-link-service.md)
53+
54+
- [Network security perimeter concepts](../private-link/network-security-perimeter-concepts.md)
55+
- [Diagnostic logs in network security perimeter](../private-link/network-security-perimeter-diagnostic-logs.md)
56+
- [Network security for Azure Service Bus](./network-security.md)
57+
- [Allow access to Azure Service Bus namespaces via private endpoints](./private-link-service.md)
58+
- [Configure customer-managed keys for Azure Service Bus](configure-customer-managed-key.md)

articles/service-bus-messaging/network-security.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,11 @@ For more information, see [What is Azure Private Link?](../private-link/private-
8181

8282
For more information, see [How to configure private endpoints for a Service Bus namespace](private-link-service.md)
8383

84+
## Network security perimeter
85+
86+
Another way to secure your Service Bus namespace is to include it in a network security perimeter. A network security perimeter establishes a logical boundary for PaaS resources, restricting communication to resources within the perimeter and controlling public access through explicit rules. This can be particularly useful when you want to establish a security boundary around Service Bus and other PaaS resources like Azure Key Vault.
87+
88+
For more information, see [Network security perimeter for Azure Service Bus](network-security-perimeter.md).
8489

8590
## Next steps
8691
See the following articles:

0 commit comments

Comments
 (0)