You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Overview of Network Security Perimeter feature for Service Bus
4
+
description: Learn how to associate an Azure Service Bus namespace with a network security perimeter
5
5
ms.reviewer: spelluru
6
6
ms.date: 01/15/2026
7
7
author: EldertGrootenboer
@@ -11,26 +11,48 @@ ms.custom:
11
11
---
12
12
13
13
14
-
# Network Security Perimeter for Azure Service Bus
14
+
# Network security perimeter for Azure Service Bus
15
15
16
-
[Azure Service Bus](./service-bus-messaging-overview.md) supports integration with [Network Security Perimeter](../private-link/network-security-perimeter-concepts.md).
16
+
[Azure Service Bus](./service-bus-messaging-overview.md) supports integration with [network security perimeter](../private-link/network-security-perimeter-concepts.md).
17
17
18
-
The Network Security Perimeter safeguards network traffic between Azure Service Bus and other Platform as a Service (PaaS) offerings like Azure Key Vault. By confining communication solely to Azure resources within its boundaries, it blocks unauthorized attempts to access resources beyond its secure perimeter.
18
+
Network security perimeter safeguards network traffic between Azure Service Bus and other Platform as a Service (PaaS) offerings like Azure Key Vault. By confining communication solely to Azure resources within its boundaries, it blocks unauthorized attempts to access resources beyond its secure perimeter.
19
+
20
+
With a network security perimeter:
21
+
22
+
- PaaS resources associated with a specific perimeter can, by default, only communicate with other PaaS resources within the same perimeter.
23
+
- You can actively permit external inbound and outbound communication by setting explicit access rules.
24
+
-[Diagnostic logs](../private-link/network-security-perimeter-diagnostic-logs.md) are enabled for PaaS resources within perimeter for audit and compliance.
19
25
20
26
Integrating Service Bus within this framework enhances messaging capabilities while ensuring robust security measures. This integration not only provides a reliable and scalable platform but also strengthens data protection strategies, mitigating risks associated with unauthorized access or data breaches.
21
27
22
-
Operating as a service under Azure Private Link, the Network Security Perimeter facilitates secure communication for PaaS services deployed outside the virtual network. It enables seamless interaction among PaaS services within the perimeter and facilitates communication with external resources through carefully configured access rules. Additionally, it supports outbound resources such as Azure Key Vault for customer-managed keys (CMK), further enhancing its versatility and utility in diverse cloud environments.
28
+
Operating as a service under Azure Private Link, network security perimeter facilitates secure communication for PaaS services deployed outside the virtual network. It enables seamless interaction among PaaS services within the perimeter and facilitates communication with external resources through carefully configured access rules. Additionally, it supports outbound resources such as Azure Key Vault for customer-managed keys (CMK), further enhancing its versatility and utility in diverse cloud environments.
29
+
30
+
## Network security perimeter scenarios in Service Bus
31
+
32
+
Azure Service Bus supports scenarios that require access to other PaaS resources:
33
+
34
+
-**Customer-managed keys (CMK)** require communication with Azure Key Vault. For more information, see [Configure customer-managed keys for encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
23
35
24
36
> [!NOTE]
25
-
> Network Security Perimeter doesn't support [Azure Service Bus Geo-Replication](./service-bus-geo-replication.md).
37
+
> - Network security perimeter doesn't support [Azure Service Bus geo-replication](./service-bus-geo-replication.md).
38
+
> - Network security perimeter rules don't govern private link traffic through [private endpoints](../private-link/private-endpoint-overview.md).
26
39
27
-
## Associate Service Bus with a Network Security Perimeter in the Azure portal
28
-
1. Search for "Network Security Perimeter" in the portal search bar. Select **Create** to create the resource.
29
-
1. Enter a name and region, and choose the subscription.
30
-
1. Under the **Resources** section, select **Associate**. Navigate to the Service Bus namespace you want to add.
40
+
## Create a network security perimeter
41
+
42
+
Create your own network security perimeter resource using [Azure portal](../private-link/create-network-security-perimeter-portal.md), [PowerShell](../private-link/create-network-security-perimeter-powershell.md), or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
43
+
44
+
## Associate Service Bus with a network security perimeter in the Azure portal
45
+
46
+
1. Go to your network security perimeter resource in the Azure portal.
47
+
1. Select **Resources** from the left menu.
48
+
1. Select **Associate** to add a new resource association.
49
+
1. Search for and select the Service Bus namespace you want to add.
50
+
1. Select a profile to associate with the namespace and select **Associate**.
31
51
32
52
## Related content
33
-
- For an overview of [Network Security Perimeter](../private-link/network-security-perimeter-concepts.md)
34
-
- For monitoring with [diagnostic logs in Network Security Perimeter](../private-link/network-security-perimeter-diagnostic-logs.md)
35
-
- For other Service Bus security features, see [Network security for Azure Service Bus](./network-security.md)
36
-
- For additional information on using private endpoints, see [Allow access to Azure Service Bus namespaces via private endpoints](./private-link-service.md)
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/network-security.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,6 +81,11 @@ For more information, see [What is Azure Private Link?](../private-link/private-
81
81
82
82
For more information, see [How to configure private endpoints for a Service Bus namespace](private-link-service.md)
83
83
84
+
## Network security perimeter
85
+
86
+
Another way to secure your Service Bus namespace is to include it in a network security perimeter. A network security perimeter establishes a logical boundary for PaaS resources, restricting communication to resources within the perimeter and controlling public access through explicit rules. This can be particularly useful when you want to establish a security boundary around Service Bus and other PaaS resources like Azure Key Vault.
87
+
88
+
For more information, see [Network security perimeter for Azure Service Bus](network-security-perimeter.md).
0 commit comments