Configure Azure Monitor with Network Security Perimeter (Preview)

This article provides the process for configuring a Network Security Perimeter (NSP) for Azure Monitor resources. Network security perimeter is a network isolation feature that provides a secured perimeter for communication between PaaS services deployed outside of a virtual network. These PaaS services can communicate with each other within the perimeter and can also communicate with resources outside the perimeter using public inbound and outbound access rules.

Network Security Perimeter allows you to control network access using network isolation settings under supported Azure Monitor resources. Once a Network Security Perimeter is configured, you can perform the following actions:

  • Control network access to your supported Azure Monitor resources based on inbound and outbound access rules defined in NSP.
  • Log all network access to your supported Azure Monitor resources.
  • Block any data exfiltration to services not in the NSP.

Regions

Azure Network Security Perimeter is currently in public preview. Network Security Perimeter features in Azure Monitor are currently available in the following 6 regions:

  • East US
  • East US 2
  • North Central US
  • South Central US
  • West US
  • West US 2

Supported components

The components of Azure Monitor that are supported with a network security perimeter are listed in the following table with their minimum API version.

Resource Resource type API version
Data collection endpoint (DCE) Microsoft.Insights/dataCollectionEndpoints 2023-03-11
Log Analytics workspace Microsoft.OperationalInsights/workspaces 2023-09-01
Log query alerts Microsoft.Insights/ScheduledQueryRules 2022-08-01-preview
Action groups 1 2 Microsoft.Insights/actionGroups 2023-05-01

1 NSP only operates with regional action groups. Global action groups default to public network access.

2 Today, Eventhub is the only supported action type for NSP. All other actions default to public network access.

The following components of Azure Monitor are not supported with a network security perimeter:

Note

For Application insights, configure NSP for the Log Analytics workspace used for the Application insights resource.

Create a network security perimeter

Create a network security perimeter using Azure portal, Azure CLI, or PowerShell.

Add Log Analytics workspace to a network security perimeter

  1. From the Network Security Perimeter menu in the Azure portal, select your network security perimeter.

  2. Select Resources and then Add -> Associate resources with an existing profile.

    Screenshot of associating a resource with a network security perimeter profile in the Azure portal.

  3. Select the profile you want to associate with the Log Analytics workspace resource.

  4. Select Associate, and then select the Log Analytics workspace.

  5. Select Associate in the bottom left-hand section of the screen to create the association with NSP.

    Screenshot of associating a workspace with a network security perimeter profile in the Azure portal.

Important

When transferring a Log Analytics workspace between resource groups or subscriptions, link it to the Network Security Perimeter (NSP) to retain security policies. If the workspace is deleted, ensure you also remove its associations from the NSP."

Access rules for Log Analytics Workspace

An NSP profile specifies rules that allow or deny access through the perimeter. Within the perimeter, all resources have mutual access at the network level although still subject to authentication and authorization. For resources outside of the NSP, you must specify inbound and outbound access rules. Inbound rules specify which connections to allow in, and outbound rules specify which requests are allowed out.

Note

Any service associated with a Network Security Perimeter implicitly allows inbound and outbound access to any other service associated with the same Network Security Perimeter when that access is authenticated using managed identities and role assignments. Access rules only need to be created when allowing access outside of the Network Security Perimeter, or for access authenticated using API keys.

Add NSP inbound access rule

NSP inbound access rules can allow the internet and resources outside the perimeter to connect with resources inside the perimeter.

NSP supports two types of inbound access rules:

  • IP Address Ranges. IP addresses or ranges must be in the Classless Inter-Domain Routing (CIDR) format. An example of CIDR notation is 8.8.8.0/24, which represents the IPs that range from 8.8.8.0 to 8.8.8.255. This type of rule allows inbound from any IP address in the range is allowed.
  • Subscriptions. This type of rule allows inbound access authenticated using any managed identity from the subscription.

Use the following process to add an NSP inbound access rule using the Azure portal:

  1. Navigate to your Network Security Perimeter resource in the Azure portal.

  2. Select Profiles and then the profile you are using with your NSP.

    Screenshot of network security perimeter profiles in the Azure portal.

  3. Select Inbound access rules.

    Screenshot of network security perimeter profile inbound access rules in the Azure portal.

  4. Click Add or Add inbound access rule. Enter or select the following values:

    Setting Value
    Rule Name The name for the inbound access rule. For example MyInboundAccessRule.
    Source Type Valid values are IP address ranges or subscriptions.
    Allowed Sources If you selected IP address ranges, enter the IP address range in CIDR format that you want to allow inbound access from. Azure IP ranges are available at Azure IP Ranges and Service Tags – Public Cloud. If you selected Subscriptions, use the subscription you want to allow inbound access from.
  5. Click Add to create the inbound access rule.

    Screenshot of network security perimeter profile new inbound access rule in the Azure portal.

Add an NSP Outbound Access Rule

Data export in a Log Analytics workspace lets you continuously export data for particular tables in your workspace. You can export to an Azure Storage Account or Azure Event Hubs as the data arrives to an Azure Monitor pipeline.

A Log analytics workspace within a security perimeter can only connect to storage and event hubs in the same perimeter. Other destinations require an outbound access rule based on the Fully Qualified Domain Name (FQDN) of the destination. For example, allow outbound access from any service associated with your Network Security Perimeter to an FQDN such as mystorageaccount.blob.core.windows.net.

Use the following process to add an NSP outbound access rule using the Azure portal:

  1. Navigate to your Network Security Perimeter resource in the Azure portal.

  2. Select Profiles and then the profile you are using with your NSP.

    Screenshot of network security perimeter profiles in the Azure portal.

  3. Select Outbound access rules.

  4. Click Add or Add outbound access rule. Enter or select the following values:

    Setting Value
    Rule Name The name for the outbound access rule. For example MyOutboundAccessRule.
    Destination Type Leave as FQDN.
    Allowed Destinations Enter a comma-separated list of FQDNs you want to allow outbound access to.
  5. Select Add to create the outbound access rule.

    Screenshot of network security perimeter profile new outbound access rule in the Azure portal.

Next steps