Skip to content

Commit 626ae82

Browse files
committed
fix for pr acrolinx issues
1 parent 2ec1140 commit 626ae82

5 files changed

Lines changed: 40 additions & 40 deletions

learn-pr/wwl-sci/design-solutions-network-security/includes/1a-evaluate-network-designs-best-practices.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,15 @@ The [Microsoft cloud security benchmark (MCSB) v2](/security/benchmark/azure/ove
1818

1919
| Control | Evaluation focus |
2020
|---|---|
21-
| **NS-1**: Establish network segmentation boundaries | VNet segmentation, NSGs, ASGs, subnet isolation |
22-
| **NS-2**: Secure cloud native services with network controls | Private endpoints, disabled public access, VNet integration, Network Security Perimeter |
21+
| **NS-1**: Establish network segmentation boundaries | virtual network segmentation, NSGs, ASGs, subnet isolation |
22+
| **NS-2**: Secure cloud native services with network controls | Private endpoints, disabled public access, virtual network integration, Network Security Perimeter |
2323
| **NS-3**: Deploy firewall at the edge of enterprise network | Azure Firewall, edge filtering, user-defined routes |
2424
| **NS-4**: Deploy intrusion detection/intrusion prevention systems (IDS/IPS) | Azure Firewall Premium IDPS, host-based EDR |
25-
| **NS-5**: Deploy DDoS protection | Azure DDoS Protection tiers on internet-facing VNets |
25+
| **NS-5**: Deploy DDoS protection | Azure DDoS Protection tiers on internet-facing virtual networks |
2626
| **NS-6**: Deploy web application firewall | Azure WAF on Application Gateway or Front Door |
2727
| **NS-7**: Manage network security centrally and effectively | Azure Virtual Network Manager Security Admin Rules, Firewall Manager, flow logs v2, Traffic Analytics |
2828
| **NS-8**: Detect and disable insecure services and protocols | Microsoft Sentinel insecure protocol detection |
29-
| **NS-9**: Connect on-premises or cloud network privately | ExpressRoute, VPN, VNet peering |
29+
| **NS-9**: Connect on-premises or cloud network privately | ExpressRoute, VPN, virtual network peering |
3030
| **NS-10**: Ensure Domain Name System (DNS) security | Azure Private DNS, Defender for DNS (included in Defender for Servers Plan) |
3131

3232
Each MCSB v2 control also maps to industry frameworks such as CIS Controls v8.1, NIST SP 800-53 r5, PCI-DSS v4, NIST CSF v2.0, ISO 27001:2022, and SOC 2, helping you align your evaluation to regulatory and compliance requirements. When you evaluate a network design, use these controls as a checklist to identify gaps and prioritize remediation.
@@ -35,7 +35,7 @@ Each MCSB v2 control also maps to industry frameworks such as CIS Controls v8.1,
3535

3636
Effective network segmentation aligns to MCSB v2 control NS-1. When evaluating a network design, determine whether it isolates workloads appropriately and controls traffic flow between segments. Key evaluation questions include:
3737

38-
- Does the design use **subscriptions, VNets, and subnets** to create layered isolation boundaries between environments and workloads?
38+
- Does the design use **subscriptions, virtual networks, and subnets** to create layered isolation boundaries between environments and workloads?
3939
- Are **network security groups (NSGs)** applied to subnets with least-privilege rules, and are **application security groups (ASGs)** used to simplify rule management?
4040
- Does the network use a **hub-and-spoke topology** (or Azure Virtual WAN) with centralized security services in the hub and deny-by-default routing between spokes?
4141
- Are **Security Admin Rules** in Azure Virtual Network Manager enforcing organizational guardrails that workload teams can't override?
@@ -48,7 +48,7 @@ A strong network design applies defense-in-depth by layering multiple security c
4848

4949
- **[Azure Firewall](/azure/firewall/overview)** as the central egress and east-west filtering point, with Premium features (TLS inspection and IDPS) for environments that require deep packet inspection.
5050
- **[Azure Web Application Firewall (WAF)](/azure/web-application-firewall/overview)** on Application Gateway or Azure Front Door for Layer 7 protection against OWASP top threats on web-facing applications.
51-
- **[Azure DDoS Protection](/azure/ddos-protection/ddos-protection-overview)** on perimeter VNets with internet-facing endpoints. Choose DDoS IP Protection for targeted deployments or DDoS Network Protection for enterprise-wide coverage.
51+
- **[Azure DDoS Protection](/azure/ddos-protection/ddos-protection-overview)** on perimeter virtual networks with internet-facing endpoints. Choose DDoS IP Protection for targeted deployments or DDoS Network Protection for enterprise-wide coverage.
5252
- **[Azure Private Link](/azure/private-link/private-link-overview)** to access PaaS services through private endpoints, removing public internet exposure and keeping traffic on the Azure backbone.
5353
- **[Azure Bastion](/azure/bastion/bastion-overview)** for secure RDP/SSH access without exposing management ports, combined with just-in-time (JIT) VM access to limit when ports are open.
5454
- **Azure ExpressRoute** for hybrid connectivity that keeps sensitive traffic off the public internet.
@@ -72,7 +72,7 @@ Later units in this module cover Internet Access and Private Access evaluation i
7272
A network design is incomplete without continuous visibility. MCSB v2 controls NS-7 and NS-8 emphasize centralized network security management and detecting insecure protocols. Evaluate whether the design includes:
7373

7474
- **Microsoft Defender for Cloud** networking recommendations, attack path analysis, and adaptive network hardening for continuous posture assessment.
75-
- **VNet flow logs** and **Traffic Analytics** for traffic pattern analysis across the environment.
75+
- **Virtual network flow logs** and **Traffic Analytics** for traffic pattern analysis across the environment.
7676
- **Azure Firewall structured logs** with IDPS and threat intelligence logging enabled.
7777
- **Centralized SIEM integration** that sends network logs to Microsoft Sentinel for cross-source correlation and incident detection.
7878

learn-pr/wwl-sci/design-solutions-network-security/includes/2-design-solutions-network-segmentation.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ Subscriptions provide the broadest isolation boundary. Resources in different su
2020

2121
### Virtual networks and subnets
2222

23-
[Virtual networks (VNets)](/azure/virtual-network/virtual-networks-overview) provide network-level containment within a subscription. No traffic flows between VNets by default—you must explicitly enable communication through peering, VPN, or routing. This default isolation is a security advantage.
23+
[Azure Virtual Networks](/azure/virtual-network/virtual-networks-overview) provide network-level containment within a subscription. No traffic flows between virtual networks by default—you must explicitly enable communication through peering, VPN, or routing. This default isolation is a security advantage.
2424

25-
Within each VNet, subnets create internal boundaries. Use [network security groups (NSGs)](/azure/virtual-network/network-security-groups-overview) on subnets to filter traffic by port, protocol, and source or destination IP address. Design NSG rules following deny-by-default principles—allow only the traffic each workload requires and deny everything else.
25+
Within each virtual network, subnets create internal boundaries. Use [network security groups (NSGs)](/azure/virtual-network/network-security-groups-overview) on subnets to filter traffic by port, protocol, and source or destination IP address. Design NSG rules following deny-by-default principles—allow only the traffic each workload requires and deny everything else.
2626

2727
[Application security groups (ASGs)](/azure/virtual-network/application-security-groups) simplify NSG rules by grouping virtual machines by application role. Instead of managing rules based on individual IP addresses, you reference ASGs in your NSG rules. This approach reduces rule complexity and the risk of misconfiguration as your environment scales.
2828

@@ -34,25 +34,25 @@ For PaaS services, [Azure Network Security Perimeter](/azure/private-link/networ
3434

3535
Your topology determines how segments connect and how traffic flows between them. Choose a pattern based on the number of workloads, regions, and the level of centralized control you need.
3636

37-
### Single VNet with subnet segmentation
37+
### Single virtual network with subnet segmentation
3838

39-
All workload components reside in one VNet, with subnets defining segment boundaries. NSGs and ASGs control traffic between subnets. This pattern suits single-region deployments with a small number of workloads.
39+
All workload components reside in one virtual network, with subnets defining segment boundaries. NSGs and ASGs control traffic between subnets. This pattern suits single-region deployments with a small number of workloads.
4040

4141
![Diagram showing a segmentation pattern with a single virtual network.](../media/single-azure-region.png)
4242

4343
This design is straightforward but provides limited centralized control. If an NSG rule is misconfigured, a public endpoint could be accidentally exposed.
4444

45-
### Multiple VNets with peering
45+
### Multiple virtual networks with peering
4646

47-
Workloads are deployed across separate VNets that connect through [virtual network peering](/azure/virtual-network/virtual-network-peering-overview). Because peering isn't transitive, each VNet pair requires explicit configuration. This pattern provides stronger isolation between workloads and supports multiregion deployments.
47+
Workloads are deployed across separate virtual networks that connect through [virtual network peering](/azure/virtual-network/virtual-network-peering-overview). Because peering isn't transitive, each virtual network pair requires explicit configuration. This pattern provides stronger isolation between workloads and supports multiregion deployments.
4848

4949
![Diagram showing a segmentation pattern with multiple virtual networks.](../media/multiple-virtual-networks.png)
5050

51-
Use this pattern when workloads have different owners or compliance requirements that warrant VNet-level separation. You can still apply NSGs within each VNet for granular subnet-level filtering.
51+
Use this pattern when workloads have different owners or compliance requirements that warrant virtual network-level separation. You can still apply NSGs within each virtual network for granular subnet-level filtering.
5252

5353
### Hub-and-spoke topology
5454

55-
A central hub VNet hosts shared security services, and spoke VNets contain workloads. Spokes connect to the hub through peering, and all inter-spoke and internet-bound traffic routes through the hub. This pattern provides the strongest centralized control and scales well as you add workloads.
55+
A central hub virtual network hosts shared security services, and spoke virtual networks contain workloads. Spokes connect to the hub through peering, and all inter-spoke and internet-bound traffic routes through the hub. This pattern provides the strongest centralized control and scales well as you add workloads.
5656

5757
![Diagram showing a segmentation pattern with a hub and spoke topology.](../media/hub-and-spoke.png)
5858

@@ -66,25 +66,25 @@ For organizations that need global transit connectivity and integrated security
6666

6767
## Enforce segmentation at scale with Azure Virtual Network Manager
6868

69-
As your network grows, manually managing NSG rules and peering across dozens of VNets becomes error-prone. [Azure Virtual Network Manager](/azure/virtual-network-manager/overview) centralizes network management and enables you to enforce segmentation policies at scale.
69+
As your network grows, manually managing NSG rules and peering across dozens of virtual networks becomes error-prone. [Azure Virtual Network Manager](/azure/virtual-network-manager/overview) centralizes network management and enables you to enforce segmentation policies at scale.
7070

7171
### Security Admin Rules
7272

7373
Security Admin Rules are a key capability of Azure Virtual Network Manager for segmentation design. These rules are evaluated **before** NSG rules, so they act as organizational guardrails that individual teams can't override. Design your Security Admin Rules to:
7474

75-
- **Block high-risk ports globally.** Deny inbound traffic on ports like RDP (3389), SSH (22), and SMB (445) from the internet across all managed VNets. Teams that need exceptions can use Azure Bastion or just-in-time VM access.
76-
- **Enforce network segmentation.** Block traffic between VNets or subnets that shouldn't communicate, regardless of individual NSG configurations.
77-
- **Allow platform services.** Use *Always Allow* rules to ensure traffic from hub infrastructure services (such as Azure Firewall or Azure Bastion) can always reach spoke VNets, preventing NSG misconfigurations from breaking critical services.
75+
- **Block high-risk ports globally.** Deny inbound traffic on ports like RDP (3389), SSH (22), and SMB (445) from the internet across all managed virtual networks. Teams that need exceptions can use Azure Bastion or just-in-time VM access.
76+
- **Enforce network segmentation.** Block traffic between virtual networks or subnets that shouldn't communicate, regardless of individual NSG configurations.
77+
- **Allow platform services.** Use *Always Allow* rules to ensure traffic from hub infrastructure services (such as Azure Firewall or Azure Bastion) can always reach spoke virtual networks, preventing NSG misconfigurations from breaking critical services.
7878

7979
Security Admin Rules support three actions: *Allow* (evaluated first, then NSG rules apply), *Deny* (traffic is dropped, NSG rules don't apply), and *Always Allow* (traffic is permitted, NSG rules are bypassed). This hierarchy lets your central security team set guardrails while application teams manage workload-specific NSG rules within those boundaries.
8080

8181
### Network groups and connectivity configurations
8282

83-
Group virtual networks into [network groups](/azure/virtual-network-manager/concept-network-groups) based on environment, region, or workload type. Use dynamic membership with Azure Policy to automatically add new VNets to the appropriate group. Then apply connectivity configurations to define whether VNets in a group use mesh or hub-and-spoke connectivity, and deploy security admin configurations to enforce segmentation rules across the group.
83+
Group virtual networks into [network groups](/azure/virtual-network-manager/concept-network-groups) based on environment, region, or workload type. Use dynamic membership with Azure Policy to automatically add new virtual networks to the appropriate group. Then apply connectivity configurations to define whether virtual networks in a group use mesh or hub-and-spoke connectivity, and deploy security admin configurations to enforce segmentation rules across the group.
8484

8585
## Control east-west traffic with Azure Firewall
8686

87-
Segmentation boundaries are only effective when you inspect and filter the traffic crossing them. Deploy Azure Firewall as the central east-west and north-south inspection point in your hub VNet. Design your firewall rules using the principle of least privilege:
87+
Segmentation boundaries are only effective when you inspect and filter the traffic crossing them. Deploy Azure Firewall as the central east-west and north-south inspection point in your hub virtual network. Design your firewall rules using the principle of least privilege:
8888

8989
- **Network rules** filter by IP address, port, and protocol for layer 3 and layer 4 traffic between segments.
9090
- **Application rules** filter by fully qualified domain name (FQDN) for HTTP/HTTPS and Azure SQL traffic, controlling which external destinations workloads can reach.
@@ -94,8 +94,8 @@ Use [Azure Firewall Manager](/azure/firewall-manager/overview) to manage policie
9494

9595
## Design microsegmentation within workloads
9696

97-
Beyond VNet and subnet boundaries, design microsegmentation within individual workloads to limit lateral movement even inside a segment. Key approaches include:
97+
Beyond virtual network and subnet boundaries, design microsegmentation within individual workloads to limit lateral movement even inside a segment. Key approaches include:
9898

9999
- **NSG rules between application tiers.** For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100-
- **Private endpoints.** Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the VNet, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
100+
- **Private endpoints.** Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the virtual network, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101101
- **Azure Bastion.** Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.

learn-pr/wwl-sci/design-solutions-network-security/includes/3-design-solutions-traffic-filtering-network-security-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,15 @@ Azure automatically creates default rules in every NSG that you can't remove but
2727

2828
| Priority | Name | Action |
2929
|---|---|---|
30-
| 65000 | AllowVNetInBound | Allow traffic within the VNet |
30+
| 65000 | AllowVNetInBound | Allow traffic within the virtual network |
3131
| 65001 | AllowAzureLoadBalancerInBound | Allow health probes from Azure Load Balancer |
3232
| 65500 | DenyAllInBound | Deny all other inbound traffic |
3333

3434
**Outbound defaults:**
3535

3636
| Priority | Name | Action |
3737
|---|---|---|
38-
| 65000 | AllowVnetOutBound | Allow traffic within the VNet |
38+
| 65000 | AllowVnetOutBound | Allow traffic within the virtual network |
3939
| 65001 | AllowInternetOutBound | Allow outbound traffic to the internet |
4040
| 65500 | DenyAllOutBound | Deny all other outbound traffic |
4141

0 commit comments

Comments
 (0)