You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/1a-evaluate-network-designs-best-practices.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,9 @@ Zero Trust is the foundational framework for evaluating modern network security
6
6
7
7
When you evaluate a network design, assess whether it enforces these three Zero Trust principles:
8
8
9
-
-**Verify explicitly** — Does the design authenticate and authorize every access request based on all available signals, including user identity, device health, location, and workload context?
10
-
-**Use least privilege access** — Does the design limit access to only necessary resources, using just-in-time and just-enough-access approaches?
11
-
-**Assume breach** — Does the design minimize blast radius through segmentation and verify end-to-end encryption, with analytics for visibility and threat detection?
9
+
-**Verify explicitly.** Does the design authenticate and authorize every access request based on all available signals, including user identity, device health, location, and workload context?
10
+
-**Use least privilege access.** Does the design limit access to only necessary resources, using just-in-time and just-enough-access approaches?
11
+
-**Assume breach.** Does the design minimize blast radius through segmentation and verify end-to-end encryption, with analytics for visibility and threat detection?
12
12
13
13
A network design that relies solely on perimeter firewalls and VPN access doesn't align with these principles. Instead, look for designs that incorporate identity-aware controls, microsegmentation, and continuous verification at every network boundary.
14
14
@@ -55,7 +55,7 @@ A strong network design applies defense-in-depth by layering multiple security c
55
55
56
56
## Evaluate identity-aware network security with Global Secure Access
57
57
58
-
Microsoft's Security Service Edge (SSE) solution — [Global Secure Access](/entra/global-secure-access/overview-what-is-global-secure-access) — extends security controls beyond the traditional network perimeter by tying enforcement directly to identity. It comprises two components: Microsoft Entra Internet Access for outbound internet and Microsoft 365 traffic, and Microsoft Entra Private Access for Zero Trust Network Access to private resources.
58
+
Microsoft's Security Service Edge (SSE) solution—[Global Secure Access](/entra/global-secure-access/overview-what-is-global-secure-access)—extends security controls beyond the traditional network perimeter by tying enforcement directly to identity. It comprises two components: Microsoft Entra Internet Access for outbound internet and Microsoft 365 traffic, and Microsoft Entra Private Access for Zero Trust Network Access to private resources.
59
59
60
60
When evaluating a design that includes Global Secure Access, assess whether:
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/2-design-solutions-network-segmentation.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,9 +20,9 @@ Subscriptions provide the broadest isolation boundary. Resources in different su
20
20
21
21
### Virtual networks and subnets
22
22
23
-
[Virtual networks (VNets)](/azure/virtual-network/virtual-networks-overview) provide network-level containment within a subscription. No traffic flows between VNets by default — you must explicitly enable communication through peering, VPN, or routing. This default isolation is a security advantage.
23
+
[Virtual networks (VNets)](/azure/virtual-network/virtual-networks-overview) provide network-level containment within a subscription. No traffic flows between VNets by default—you must explicitly enable communication through peering, VPN, or routing. This default isolation is a security advantage.
24
24
25
-
Within each VNet, subnets create internal boundaries. Use [network security groups (NSGs)](/azure/virtual-network/network-security-groups-overview) on subnets to filter traffic by port, protocol, and source or destination IP address. Design NSG rules following deny-by-default principles — allow only the traffic each workload requires and deny everything else.
25
+
Within each VNet, subnets create internal boundaries. Use [network security groups (NSGs)](/azure/virtual-network/network-security-groups-overview) on subnets to filter traffic by port, protocol, and source or destination IP address. Design NSG rules following deny-by-default principles—allow only the traffic each workload requires and deny everything else.
26
26
27
27
[Application security groups (ASGs)](/azure/virtual-network/application-security-groups) simplify NSG rules by grouping virtual machines by application role. Instead of managing rules based on individual IP addresses, you reference ASGs in your NSG rules. This approach reduces rule complexity and the risk of misconfiguration as your environment scales.
28
28
@@ -58,9 +58,9 @@ A central hub VNet hosts shared security services, and spoke VNets contain workl
58
58
59
59
Deploy [Azure Firewall](/azure/firewall/overview) in the hub to enforce centralized network and application rules across all spokes. Define [user-defined routes (UDRs)](/azure/virtual-network/virtual-networks-udr-overview) on spoke subnets to direct traffic through the firewall. Key design benefits include:
60
60
61
-
-**Deny by default between spokes** — Inter-spoke traffic is blocked unless explicitly allowed through firewall rules.
62
-
-**Centralized logging** — Azure Firewall logs all accepted and denied traffic to Azure Monitor, providing a single view of traffic across the network.
63
-
-**Asymmetric routing protection** — Even if someone accidentally creates a public endpoint in a spoke, the return packet is dropped by the stateful firewall, preventing unintended access.
61
+
-**Deny by default between spokes.** Inter-spoke traffic is blocked unless explicitly allowed through firewall rules.
62
+
-**Centralized logging.** Azure Firewall logs all accepted and denied traffic to Azure Monitor, providing a single view of traffic across the network.
63
+
-**Asymmetric routing protection.** Even if someone accidentally creates a public endpoint in a spoke, the return packet is dropped by the stateful firewall, preventing unintended access.
64
64
65
65
For organizations that need global transit connectivity and integrated security across multiple regions, [Azure Virtual WAN](/azure/virtual-wan/virtual-wan-about) provides a managed hub-and-spoke architecture with built-in routing, VPN, ExpressRoute, and Azure Firewall integration.
66
66
@@ -72,9 +72,9 @@ As your network grows, manually managing NSG rules and peering across dozens of
72
72
73
73
Security Admin Rules are a key capability of Azure Virtual Network Manager for segmentation design. These rules are evaluated **before** NSG rules, so they act as organizational guardrails that individual teams can't override. Design your Security Admin Rules to:
74
74
75
-
-**Block high-risk ports globally** — Deny inbound traffic on ports like RDP (3389), SSH (22), and SMB (445) from the internet across all managed VNets. Teams that need exceptions can use Azure Bastion or just-in-time VM access.
76
-
-**Enforce network segmentation** — Block traffic between VNets or subnets that shouldn't communicate, regardless of individual NSG configurations.
77
-
-**Allow platform services** — Use *Always Allow* rules to ensure traffic from hub infrastructure services (such as Azure Firewall or Azure Bastion) can always reach spoke VNets, preventing NSG misconfigurations from breaking critical services.
75
+
-**Block high-risk ports globally.** Deny inbound traffic on ports like RDP (3389), SSH (22), and SMB (445) from the internet across all managed VNets. Teams that need exceptions can use Azure Bastion or just-in-time VM access.
76
+
-**Enforce network segmentation.** Block traffic between VNets or subnets that shouldn't communicate, regardless of individual NSG configurations.
77
+
-**Allow platform services.** Use *Always Allow* rules to ensure traffic from hub infrastructure services (such as Azure Firewall or Azure Bastion) can always reach spoke VNets, preventing NSG misconfigurations from breaking critical services.
78
78
79
79
Security Admin Rules support three actions: *Allow* (evaluated first, then NSG rules apply), *Deny* (traffic is dropped, NSG rules don't apply), and *Always Allow* (traffic is permitted, NSG rules are bypassed). This hierarchy lets your central security team set guardrails while application teams manage workload-specific NSG rules within those boundaries.
80
80
@@ -90,12 +90,12 @@ Segmentation boundaries are only effective when you inspect and filter the traff
90
90
-**Application rules** filter by fully qualified domain name (FQDN) for HTTP/HTTPS and Azure SQL traffic, controlling which external destinations workloads can reach.
91
91
-**Threat intelligence** blocks traffic to and from known malicious IP addresses and domains.
92
92
93
-
Use [Azure Firewall Manager](/azure/firewall-manager/overview) to manage policies across multiple firewalls and regions through a parent-child policy hierarchy — a base policy sets organization-wide rules, and child policies add environment-specific overrides.
93
+
Use [Azure Firewall Manager](/azure/firewall-manager/overview) to manage policies across multiple firewalls and regions through a parent-child policy hierarchy—a base policy sets organization-wide rules, and child policies add environment-specific overrides.
94
94
95
95
## Design microsegmentation within workloads
96
96
97
97
Beyond VNet and subnet boundaries, design microsegmentation within individual workloads to limit lateral movement even inside a segment. Key approaches include:
98
98
99
-
-**NSG rules between application tiers** — For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100
-
-**Private endpoints** — Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the VNet, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101
-
-**Azure Bastion** — Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.
99
+
-**NSG rules between application tiers.** For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100
+
-**Private endpoints.** Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the VNet, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101
+
-**Azure Bastion.** Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.
0 commit comments