Public versus private connectivity for Azure Resources:
Azure resources are globally unique. They can be reached
from anywhere on the internet by name or by their public IP addresses. A
variety of clients such as mobile phones, personal laptops and remote
departments can connect to them. They are cloud resources, so they bring the
best practice from deployment, availability and service-level agreements.
Azure cloud resources are also used internally by
organizations as their Information Technology resources. They must be protected
from external access. One way to secure these resources from undesirable access
is to use private connectivity.
The private connectivity avoids all relays over the
internet. Azure resources no longer need public IP addresses in this case and
can be reached on their private ip address. All the firewall rules for port
restriction against the public IP address access goes away. The result is a
cleaner, low latency network access and this is both safe and secure.
When the Azure resource is a storage account or a key vault,
the access is not straightforward because there could be many applications and
services on premises or remote that use them. In these cases, those consuming
services may have their own virtual network. When we visit the portal for
reviewing the storage account or the key vault, its networking section shows
the options to disable internet access. When this option is selected, the
consuming services can still reach the resource if they are on the same virtual
network, but all external access will be prohibited. This is helpful towards
eliminating internet-based access for these resources. A less restrictive
option would be to list all the virtual networks from which accesses may
originate so that these resources are no longer accessible from anywhere else
including the internet and except for those virtual networks. These consuming
services on the registered virtual networks can still access the resource over
the internet. Their public connectivity is not disrupted
Another option is to dedicate a private endpoint or link to
the resource so that the private connectivity is established. This option is
helpful for both on-premises and cloud services that use these resources. Their
usage is narrowed down to just these resources.
When the services and the resources are in different
regions, they must have vnet peering because vnets do not stretch between
regions Peering helps services and resources to connect across virtual networks
Finally, for remote clients that want to access the azure
resources and cannot avoid the internet, they can do so over VPN. In this case,
a VPN gateway and Point-2-site connectivity is required.
No comments:
Post a Comment