Skip to content

Commit 2ec1140

Browse files
committed
update for acrolinx
1 parent cb447df commit 2ec1140

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

learn-pr/wwl-sci/design-solutions-network-security/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
As organizations adopt hybrid and multicloud architectures, the network perimeter extends well beyond a single data center or virtual network. A security architect must evaluate network designs against Zero Trust principles, segment workloads to limit lateral movement, filter traffic at multiple layers, monitor for threats in real time, and secure access for both internet-bound and private traffic.
22

3-
Imagine you're a cybersecurity architect at a large enterprise that operates across Azure, on-premises data centers, and multiple SaaS services. Leadership asks you to review the current network security posture and recommend improvements. You need to evaluate whether the existing segmentation strategy limits blast radius, determine whether traffic filtering rules follow least-privilege principles, assess monitoring coverage for blind spots, and decide how Microsoft Entra Internet Access and Private Access can replace legacy VPN and proxy infrastructure. Each decision affects the organization's ability to detect and contain threats before they spread.
3+
Imagine you're a cybersecurity architect at a large enterprise that operates across Azure, on-premises data centers, and multiple SaaS services. Leadership asks you to review the current network security posture and recommend improvements. You need to evaluate whether the existing segmentation strategy limits blast radius, determine whether traffic filtering rules follow least-privilege principles, assess monitoring coverage for gaps, and decide how Microsoft Entra Internet Access and Private Access can replace legacy VPN and proxy infrastructure. Each decision affects the organization's ability to detect and contain threats before they spread.
44

55
## Learning objectives
66

0 commit comments

Comments
 (0)