In our Azure Landing Zone Architecture, the organization has implemented a policy at the management group level that requires subnets to be created with a Network Security Group (NSG) in the subscription.
Referencing my previous question here:
https://learn.microsoft.com/en-us/answers/questions/2259499/confusion-in-the-subnets-creation-with-the-multi-r
We have provisioned Azure Infrastructure in the UK South region, secured within the VNet and NSG rules.
For staff in other countries, we created private endpoints using Subnet 1 in the East US VNet.
This setup results in two NSGs: one in the UK South region and another in the East US region.
As we know, private endpoints require a dedicated subnet (Subnet 1), VNet integration requires a dedicated subnet (Subnet 2), and logic apps require a dedicated outbound subnet (Subnet 3).
For all these subnets, I have defined NSG rules to ensure secure communication and the necessary ports.
Note: All VNets are internally connected using peering.
Question: Since I do not require outbound subnets in the East US VNet, are the NSG rules present in the UK South NSG also unnecessary in the East US NSG?