You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/advanced-security-compute/includes/10-azure-data-encryption.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ In addition to satisfying compliance and regulatory requirements, encryption at
23
23
24
24
Microsoft is committed to encryption at rest options across cloud services and giving customers control of encryption keys and logs of key use. Additionally, Microsoft is working towards encrypting all customer data at rest by default.
25
25
26
-
## Azure Encryption at Rest Components
26
+
## Azure Encryption at Rest components
27
27
28
28
As described previously, the goal of encryption at rest is that data that is persisted on disk is encrypted with a secret encryption key. To achieve that goal secure key creation, storage, access control, and management of the encryption keys must be provided. Though details might vary, Azure services Encryption at Rest implementations can be described in terms illustrated in the following diagram.
29
29
@@ -38,7 +38,7 @@ The storage location of the encryption keys and access control to those keys is
38
38
39
39
Permissions to use the keys stored in Azure Key Vault, either to manage or to access them for Encryption at Rest encryption and decryption, can be given to Microsoft Entra accounts.
40
40
41
-
## Envelope Encryption with a Key Hierarchy
41
+
## Envelope encryption with a key hierarchy
42
42
43
43
More than one encryption key is used in an encryption at rest implementation. Storing an encryption key in Azure Key Vault ensures secure key access and central management of keys. However, service local access to encryption keys is more efficient for bulk encryption and decryption than interacting with Key Vault for every data operation, allowing for stronger encryption and better performance. Limiting the use of a single encryption key decreases the risk that the key is compromised and the cost of re-encryption when a key must be replaced. Azure encryption at rest models uses envelope encryption, where a key encryption key encrypts a data encryption key. This model forms a key hierarchy that is better able to address performance and security requirements:
| API Management services should use a virtual network | Azure Virtual Network deployment provides enhanced security, isolation and allows you to place your API Management service in a non-internet routable network that you control access to. These networks can then be connected to your on-premises networks using various VPN technologies, which enables access to your backend services within the network and/or on-premises. The developer portal and API gateway can be configured to be accessible either from the Internet or only within the virtual network. | Audit, Deny, Disabled | 1.0.2 |
61
61
| API Management should disable public network access to the service configuration endpoints | To secure API Management services, restrict access to configuration endpoints like the management API, Git config, and self-hosted gateway setup. | AuditIfNotExists, Disabled | 1.0.1 |
62
62
63
-
**NS-6**: **Deploy web application firewall**
63
+
### **NS-6**: **Deploy web application firewall**
64
64
65
65
Other guidance for NS-6: To protect critical Web/HTTP APIs, configure API Management within a Virtual Network (VNET) in internal mode and configure an Azure Application Gateway. Application Gateway is a PaaS service. It acts as a reverse-proxy and provides L7 load balancing, routing, web application firewall (WAF), and other services. Learn more.
66
66
@@ -117,7 +117,7 @@ Alternatively, the sign-in/sign-up process can be further customized through del
117
117
118
118
### IM-7: Restrict resource access based on conditions
119
119
120
-
Features: Conditional Access for Data Plane
120
+
Feature: Conditional Access for Data Plane
121
121
122
122
Description: Data plane access can be controlled using Microsoft Entra Conditional Access policies.
123
123
@@ -135,7 +135,7 @@ Configuration Guidance: Set up integration of API Management with Azure Key Vaul
135
135
136
136
### PA-1: Separate and limit highly privileged/administrative users
137
137
138
-
**Feature**: Local Admin Accounts
138
+
Feature: Local Admin Accounts
139
139
140
140
Description: Service has the concept of a local administrative account.
141
141
@@ -234,7 +234,7 @@ Feature: Azure Resource Logs
234
234
235
235
Description: Service produces resource logs that can provide enhanced service-specific metrics and logging. The customer can configure these resource logs and send them to their own data sink like a storage account or log analytics workspace.
236
236
237
-
Configuration Guidance: Enable resource logs for API Management, resource logs provide rich information about operations, and errors that are important for auditing and troubleshooting purposes. Categories of resource logs for API Management include:
237
+
Configuration Guidance: Enable resource logs for API Management. Resource logs provide rich information about operations, and errors that are important for auditing and troubleshooting purposes. Categories of resource logs for API Management include:
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/advanced-security-compute/includes/2-remote-access-public-endpoints-include-azure-bastion.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ The following diagram shows connections to virtual machines via a Bastion deploy
14
14
| RDP and SSH through the Azure portal | You can get to the RDP and SSH session directly in the Azure portal using a single click seamless experience. |
15
15
| Remote Session over TLS and firewall traversal for RDP/SSH | Azure Bastion uses an HTML5 based web client that is automatically streamed to your local device. Your RDP/SSH session is over TLS on port 443. Traffic can traverse firewalls more securely. Bastion supports TLS 1.2 and above. Older TLS versions aren't supported. |
16
16
| No Public IP address required on the Azure VM | Azure Bastion opens the RDP/SSH connection to your Azure VM by using the private IP address on your VM. You don't need a public IP address on your virtual machine. |
17
-
| No hassle of managing Network Security Groups (NSGs) | You don't need to apply any NSGs to the Azure Bastion subnet. Because Azure Bastion connects to your virtual machines over private IP, you can configure your NSGs to allow RDP/SSH from Azure Bastion only. Removing the hassle of managing NSGs each time you need to securely connect to your virtual machines. |
17
+
| No hassle of managing Network Security Groups (NSGs) | You don’t need to apply NSGs to the Azure Bastion subnet. Since Bastion connects to your virtual machines using private IPs, you can configure NSGs to allow RDP and SSH traffic only from Bastion. This eliminates the hassle of updating NSGs every time you need secure access to your VMs. |
18
18
| No need to manage a separate bastion host on a VM | Azure Bastion is a fully managed platform PaaS service from Azure that is hardened internally to provide you secure RDP/SSH connectivity. |
19
19
| Protection against port scanning | Your VMs are protected against port scanning by rogue and malicious users because you don't need to expose the VMs to the internet. |
20
20
| Hardening in one place only | Azure Bastion sits at the perimeter of your virtual network, so you don’t need to worry about hardening each of the VMs in your virtual network. |
@@ -85,6 +85,7 @@ Azure Bastion supports manual host scaling for Standard and Premium SKUs. You ca
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/advanced-security-compute/includes/3-azure-kubernetes-service-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,13 +72,13 @@ The following list describes some of the common use cases for AKS, but by no mea
72
72
73
73
**Networking**
74
74
- Use [Kubenet networking](/azure/aks/concepts-network#kubenet-basic-networking) for simple deployments and [Azure Container Networking Interface (CNI) networking](/azure/aks/concepts-network#azure-cni-advanced-networking) for advanced scenarios.
75
-
-[Bring your own Container Network Interface (CNI)](/azure/aks/use-byo-cni) to use a external CNI plugin.
76
-
- Easily access applications deployed to your clusters using the [application routing add-on with nginx](/azure/aks/app-routing). |
75
+
-[Bring your own Container Network Interface (CNI)](/azure/aks/use-byo-cni) to use an external CNI plugin.
76
+
- Easily access applications deployed to your clusters using the [application routing add-on with nginx](/azure/aks/app-routing).
77
77
78
78
**Development tooling integration**
79
79
- Develop on AKS with [Helm](/azure/aks/quickstart-helm).
80
80
- Install the [Kubernetes extension for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=ms-kubernetes-tools.vscode-kubernetes-tools) to manage your workloads.
81
-
- Apply the features of Istio with the [Istio-based service mesh add-on](/azure/aks/istio-about).|
81
+
- Apply the features of Istio with the [Istio-based service mesh add-on](/azure/aks/istio-about).
0 commit comments