You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/1-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
As organizations adopt hybrid and multicloud architectures, the network perimeter extends well beyond a single data center or virtual network. A security architect must evaluate network designs against Zero Trust principles, segment workloads to limit lateral movement, filter traffic at multiple layers, monitor for threats in real time, and secure access for both internet-bound and private traffic.
2
2
3
-
Imagine you're a cybersecurity architect at a large enterprise that operates across Azure, on-premises data centers, and multiple SaaS services. Leadership asks you to review the current network security posture and recommend improvements. You need to evaluate whether the existing segmentation strategy limits blast radius, determine whether traffic filtering rules follow least-privilege principles, assess monitoring coverage for blind spots, and decide how Microsoft Entra Internet Access and Private Access can replace legacy VPN and proxy infrastructure. Each decision affects the organization's ability to detect and contain threats before they spread.
3
+
Imagine you're a cybersecurity architect at a large enterprise that operates across Azure, on-premises data centers, and multiple SaaS services. Leadership asks you to review the current network security posture and recommend improvements. You need to evaluate whether the existing segmentation strategy limits blast radius, determine whether traffic filtering rules follow least-privilege principles, assess monitoring coverage for gaps, and decide how Microsoft Entra Internet Access and Private Access can replace legacy VPN and proxy infrastructure. Each decision affects the organization's ability to detect and contain threats before they spread.
0 commit comments