Ensure that your Microsoft Azure Cache for Redis servers are configured to use Network Security Groups (NSGs). NSGs provide an additional layer of security for Redis cache servers deployed inside a virtual network (VNet) by controlling network traffic. This helps to protect your cache servers from unauthorized access and potential attacks by limiting inbound and outbound connections.
Using Network Security Groups to control traffic to and from Azure Cache for Redis servers is important for the following reasons:
- Traffic Filtering: NSGs act as a virtual firewall, enabling you to filter both inbound and outbound traffic based on defined security rules. This reduces the attack surface by restricting access to only trusted sources or destinations.
- Isolation and Segmentation: NSGs allow you to isolate and segment your cache servers from other resources in the network, ensuring that only authorized traffic can communicate with them. This improves the overall security posture of your Azure cloud environment.
- Compliance and Security Policies: By using NSGs, you can enforce organizational security policies, ensuring that your applications meet regulatory or compliance requirements by controlling the flow of data and limiting unauthorized access.
- Mitigating Threats: Controlling traffic with NSGs helps prevent common network-based attacks such as Distributed Denial-of-Service (DDoS), port scanning, or unauthorized access attempts, enhancing the app's resilience against external threats.
Overall, Network Security Groups (NSGs) provide robust protection for your Azure Cache for Redis servers by effectively shielding them from unauthorized access and malicious attacks.
Network Security Groups (NSGs) can be implemented for Azure Cache for Redis servers available in the Premium tier.
Audit
To determine if your Azure Cache for Redis servers are configured to use Network Security Groups (NSGs), perform the following operations:
Remediation / Resolution
To configure Network Security Groups (NSGs) for your Microsoft Azure Cache for Redis servers, perform the following operations:
To be able to control network traffic with Network Security Groups, virtual network (VNet) integration must be enabled for your Azure Cache for Redis servers. VNet integration allows Redis cache servers to securely access resources within an Azure virtual network, such as virtual machines, by connecting to the VNet. This guide assumes that VNet integration is enabled for your Azure Cache for Redis servers.References
- Azure Official Documentation
- Network security groups
- Create, change, or delete a network security group
- Configure virtual network (VNet) support for a Premium Azure Cache for Redis instance
- Azure best practices for network security
- Azure security baseline for Azure Cache for Redis
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az redis list
- az redis show
- az resource show
- az network nsg create
- az network nsg rule create
- az network vnet subnet update