Skip to content

Commit cb447df

Browse files
committed
fix for acrolinx
1 parent f67b418 commit cb447df

6 files changed

Lines changed: 51 additions & 51 deletions

learn-pr/wwl-sci/design-solutions-network-security/includes/1a-evaluate-network-designs-best-practices.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Zero Trust is the foundational framework for evaluating modern network security
66

77
When you evaluate a network design, assess whether it enforces these three Zero Trust principles:
88

9-
- **Verify explicitly** Does the design authenticate and authorize every access request based on all available signals, including user identity, device health, location, and workload context?
10-
- **Use least privilege access** Does the design limit access to only necessary resources, using just-in-time and just-enough-access approaches?
11-
- **Assume breach** Does the design minimize blast radius through segmentation and verify end-to-end encryption, with analytics for visibility and threat detection?
9+
- **Verify explicitly.** Does the design authenticate and authorize every access request based on all available signals, including user identity, device health, location, and workload context?
10+
- **Use least privilege access.** Does the design limit access to only necessary resources, using just-in-time and just-enough-access approaches?
11+
- **Assume breach.** Does the design minimize blast radius through segmentation and verify end-to-end encryption, with analytics for visibility and threat detection?
1212

1313
A network design that relies solely on perimeter firewalls and VPN access doesn't align with these principles. Instead, look for designs that incorporate identity-aware controls, microsegmentation, and continuous verification at every network boundary.
1414

@@ -55,7 +55,7 @@ A strong network design applies defense-in-depth by layering multiple security c
5555

5656
## Evaluate identity-aware network security with Global Secure Access
5757

58-
Microsoft's Security Service Edge (SSE) solution[Global Secure Access](/entra/global-secure-access/overview-what-is-global-secure-access)extends security controls beyond the traditional network perimeter by tying enforcement directly to identity. It comprises two components: Microsoft Entra Internet Access for outbound internet and Microsoft 365 traffic, and Microsoft Entra Private Access for Zero Trust Network Access to private resources.
58+
Microsoft's Security Service Edge (SSE) solution[Global Secure Access](/entra/global-secure-access/overview-what-is-global-secure-access)extends security controls beyond the traditional network perimeter by tying enforcement directly to identity. It comprises two components: Microsoft Entra Internet Access for outbound internet and Microsoft 365 traffic, and Microsoft Entra Private Access for Zero Trust Network Access to private resources.
5959

6060
When evaluating a design that includes Global Secure Access, assess whether:
6161

learn-pr/wwl-sci/design-solutions-network-security/includes/2-design-solutions-network-segmentation.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ Subscriptions provide the broadest isolation boundary. Resources in different su
2020

2121
### Virtual networks and subnets
2222

23-
[Virtual networks (VNets)](/azure/virtual-network/virtual-networks-overview) provide network-level containment within a subscription. No traffic flows between VNets by defaultyou must explicitly enable communication through peering, VPN, or routing. This default isolation is a security advantage.
23+
[Virtual networks (VNets)](/azure/virtual-network/virtual-networks-overview) provide network-level containment within a subscription. No traffic flows between VNets by defaultyou must explicitly enable communication through peering, VPN, or routing. This default isolation is a security advantage.
2424

25-
Within each VNet, subnets create internal boundaries. Use [network security groups (NSGs)](/azure/virtual-network/network-security-groups-overview) on subnets to filter traffic by port, protocol, and source or destination IP address. Design NSG rules following deny-by-default principlesallow only the traffic each workload requires and deny everything else.
25+
Within each VNet, subnets create internal boundaries. Use [network security groups (NSGs)](/azure/virtual-network/network-security-groups-overview) on subnets to filter traffic by port, protocol, and source or destination IP address. Design NSG rules following deny-by-default principlesallow only the traffic each workload requires and deny everything else.
2626

2727
[Application security groups (ASGs)](/azure/virtual-network/application-security-groups) simplify NSG rules by grouping virtual machines by application role. Instead of managing rules based on individual IP addresses, you reference ASGs in your NSG rules. This approach reduces rule complexity and the risk of misconfiguration as your environment scales.
2828

@@ -58,9 +58,9 @@ A central hub VNet hosts shared security services, and spoke VNets contain workl
5858

5959
Deploy [Azure Firewall](/azure/firewall/overview) in the hub to enforce centralized network and application rules across all spokes. Define [user-defined routes (UDRs)](/azure/virtual-network/virtual-networks-udr-overview) on spoke subnets to direct traffic through the firewall. Key design benefits include:
6060

61-
- **Deny by default between spokes** Inter-spoke traffic is blocked unless explicitly allowed through firewall rules.
62-
- **Centralized logging** Azure Firewall logs all accepted and denied traffic to Azure Monitor, providing a single view of traffic across the network.
63-
- **Asymmetric routing protection** Even if someone accidentally creates a public endpoint in a spoke, the return packet is dropped by the stateful firewall, preventing unintended access.
61+
- **Deny by default between spokes.** Inter-spoke traffic is blocked unless explicitly allowed through firewall rules.
62+
- **Centralized logging.** Azure Firewall logs all accepted and denied traffic to Azure Monitor, providing a single view of traffic across the network.
63+
- **Asymmetric routing protection.** Even if someone accidentally creates a public endpoint in a spoke, the return packet is dropped by the stateful firewall, preventing unintended access.
6464

6565
For organizations that need global transit connectivity and integrated security across multiple regions, [Azure Virtual WAN](/azure/virtual-wan/virtual-wan-about) provides a managed hub-and-spoke architecture with built-in routing, VPN, ExpressRoute, and Azure Firewall integration.
6666

@@ -72,9 +72,9 @@ As your network grows, manually managing NSG rules and peering across dozens of
7272

7373
Security Admin Rules are a key capability of Azure Virtual Network Manager for segmentation design. These rules are evaluated **before** NSG rules, so they act as organizational guardrails that individual teams can't override. Design your Security Admin Rules to:
7474

75-
- **Block high-risk ports globally** Deny inbound traffic on ports like RDP (3389), SSH (22), and SMB (445) from the internet across all managed VNets. Teams that need exceptions can use Azure Bastion or just-in-time VM access.
76-
- **Enforce network segmentation** Block traffic between VNets or subnets that shouldn't communicate, regardless of individual NSG configurations.
77-
- **Allow platform services** Use *Always Allow* rules to ensure traffic from hub infrastructure services (such as Azure Firewall or Azure Bastion) can always reach spoke VNets, preventing NSG misconfigurations from breaking critical services.
75+
- **Block high-risk ports globally.** Deny inbound traffic on ports like RDP (3389), SSH (22), and SMB (445) from the internet across all managed VNets. Teams that need exceptions can use Azure Bastion or just-in-time VM access.
76+
- **Enforce network segmentation.** Block traffic between VNets or subnets that shouldn't communicate, regardless of individual NSG configurations.
77+
- **Allow platform services.** Use *Always Allow* rules to ensure traffic from hub infrastructure services (such as Azure Firewall or Azure Bastion) can always reach spoke VNets, preventing NSG misconfigurations from breaking critical services.
7878

7979
Security Admin Rules support three actions: *Allow* (evaluated first, then NSG rules apply), *Deny* (traffic is dropped, NSG rules don't apply), and *Always Allow* (traffic is permitted, NSG rules are bypassed). This hierarchy lets your central security team set guardrails while application teams manage workload-specific NSG rules within those boundaries.
8080

@@ -90,12 +90,12 @@ Segmentation boundaries are only effective when you inspect and filter the traff
9090
- **Application rules** filter by fully qualified domain name (FQDN) for HTTP/HTTPS and Azure SQL traffic, controlling which external destinations workloads can reach.
9191
- **Threat intelligence** blocks traffic to and from known malicious IP addresses and domains.
9292

93-
Use [Azure Firewall Manager](/azure/firewall-manager/overview) to manage policies across multiple firewalls and regions through a parent-child policy hierarchya base policy sets organization-wide rules, and child policies add environment-specific overrides.
93+
Use [Azure Firewall Manager](/azure/firewall-manager/overview) to manage policies across multiple firewalls and regions through a parent-child policy hierarchya base policy sets organization-wide rules, and child policies add environment-specific overrides.
9494

9595
## Design microsegmentation within workloads
9696

9797
Beyond VNet and subnet boundaries, design microsegmentation within individual workloads to limit lateral movement even inside a segment. Key approaches include:
9898

99-
- **NSG rules between application tiers** For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100-
- **Private endpoints** Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the VNet, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101-
- **Azure Bastion** Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.
99+
- **NSG rules between application tiers.** For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100+
- **Private endpoints.** Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the VNet, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101+
- **Azure Bastion.** Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.

0 commit comments

Comments
 (0)