You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/3-design-solutions-traffic-filtering-network-security-groups.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/1-introduction.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,20 @@
1
-
This module provides an overview of some of the technical considerations and available capabilities to design solutions for networksecurity as a Microsoft cybersecurity architect.
1
+
As organizations adopt hybrid and multicloud architectures, the network perimeter extends well beyond a single data center or virtual network. A security architect must evaluate network designs against Zero Trust principles, segment workloads to limit lateral movement, filter traffic at multiple layers, monitor for threats in real time, and secure access for both internet-bound and private traffic.
2
2
3
-
Imagine you're a cybersecurity architect for a multinational corporation. Your company decided to migrate its infrastructure to Azure. You're tasked with ensuring the security and efficiency of the network architecture. Securing network infrastructure involves understanding and implementing Azure's segmentation features, setting up network security groups, utilizing the network map functionality in Microsoft Defender for Cloud, analyzing network traffic, and managing internet and private access. The challenge lies in choosing the right tools and strategies to ensure optimal network performance and security.
3
+
Imagine you're a cybersecurity architect at a large enterprise that operates across Azure, on-premises data centers, and multiple SaaS services. Leadership asks you to review the current network security posture and recommend improvements. You need to evaluate whether the existing segmentation strategy limits blast radius, determine whether traffic filtering rules follow least-privilege principles, assess monitoring coverage for blind spots, and decide how Microsoft Entra Internet Access and Private Access can replace legacy VPN and proxy infrastructure. Each decision affects the organization's ability to detect and contain threats before they spread.
4
4
5
5
## Learning objectives
6
6
7
7
In this module, you learn how to:
8
8
9
+
- Evaluate network designs to align with security requirements and best practices
9
10
- Design solutions for network segmentation
10
11
- Design solutions for filtering traffic with network security groups
11
-
- Design solutions for network posture measurement
12
+
- Design solutions for network posture management
12
13
- Design solutions for network monitoring
13
-
- Design solutions that use Microsoft Entra Internet Access and Private Access
14
+
- Evaluate solutions that use Microsoft Entra Internet Access
15
+
- Evaluate solutions that use Microsoft Entra Private Access
14
16
15
-
The content in the module helps you prepare for the certification exam SC-100: Microsoft Cybersecurity Architect.
17
+
The content in this module helps you prepare for the certification exam SC-100: Microsoft Cybersecurity Architect.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/1a-evaluate-network-designs-best-practices.md
+27-85Lines changed: 27 additions & 85 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,105 +33,47 @@ Each MCSB v2 control also maps to industry frameworks such as CIS Controls v8.1,
33
33
34
34
## Evaluate segmentation and traffic control
35
35
36
-
Effective network segmentation is a core security requirement and aligns to MCSB v2 control NS-1. When evaluating a network design, determine whether it isolates workloads appropriately and controls traffic flow between segments.
36
+
Effective network segmentation aligns to MCSB v2 control NS-1. When evaluating a network design, determine whether it isolates workloads appropriately and controls traffic flow between segments. Key evaluation questions include:
37
37
38
-
### Network segmentation layers
38
+
- Does the design use **subscriptions, VNets, and subnets** to create layered isolation boundaries between environments and workloads?
39
+
- Are **network security groups (NSGs)** applied to subnets with least-privilege rules, and are **application security groups (ASGs)** used to simplify rule management?
40
+
- Does the network use a **hub-and-spoke topology** (or Azure Virtual WAN) with centralized security services in the hub and deny-by-default routing between spokes?
41
+
- Are **Security Admin Rules** in Azure Virtual Network Manager enforcing organizational guardrails that workload teams can't override?
39
42
40
-
Azure provides multiple segmentation options that create layers of isolation. Evaluate whether the design uses them effectively:
41
-
42
-
-**Subscriptions** separate organizational units and provide platform-level isolation between environments such as production, development, and testing.
43
-
-**Virtual networks (VNets)** provide network-level containment, with no traffic allowed between VNets by default — communication must be explicitly provisioned.
44
-
-**Subnets** with **network security groups (NSGs)** create granular perimeters within a VNet. Evaluate whether NSG rules follow the principle of least privilege, with only required traffic allowed between subnets.
45
-
-**Application security groups (ASGs)** simplify rule management by grouping VMs by application role, reducing rule complexity and the risk of misconfiguration.
46
-
47
-
### Hub-and-spoke topology
48
-
49
-
For most enterprise environments, evaluate whether the design uses a hub-and-spoke model. In this pattern, a central hub VNet hosts shared security services like Azure Firewall, and spoke VNets contain workloads. All traffic between spokes and to the internet routes through the hub. This design provides:
50
-
51
-
- Centralized security policy enforcement
52
-
- Consistent logging and monitoring at the hub
53
-
- Reduced security posture management overhead as the network grows
54
-
55
-
When the hub-and-spoke model is in place, verify that traffic between spokes is denied by default and only permitted paths are configured through the firewall.
43
+
The next unit covers how to design these segmentation patterns in detail, including topology selection, Azure Virtual Network Manager, and microsegmentation within workloads.
56
44
57
45
## Evaluate defense-in-depth controls
58
46
59
-
A strong network design applies defense-in-depth by layering multiple security controls. MCSB v2 controls NS-3 through NS-6 define the specific controls to evaluate at each layer.
60
-
61
-
### Azure Firewall
62
-
63
-
[Azure Firewall](/azure/firewall/overview) is a cloud-native, stateful firewall as a service. It provides centralized network and application rule enforcement across VNets and subscriptions. When evaluating, check whether the design:
64
-
65
-
- Uses Azure Firewall as the central egress and east-west filtering point in a hub VNet
66
-
- Leverages Azure Firewall Premium features such as TLS inspection and intrusion detection and prevention system (IDPS) for environments that require deep packet inspection
67
-
- Integrates with Azure Firewall Manager to centrally manage policies across multiple firewalls
68
-
69
-
### Azure Web Application Firewall
70
-
71
-
For designs that include web-facing applications, evaluate whether [Azure Web Application Firewall (WAF)](/azure/web-application-firewall/overview) protects against Layer 7 attacks. WAF is available through Azure Application Gateway for regional workloads and through Azure Front Door for global workloads. Verify that the design uses managed rule sets aligned with OWASP top threats, rate limiting, and bot protection.
72
-
73
-
### Azure DDoS Protection
74
-
75
-
Evaluate whether the design enables Azure DDoS Protection on perimeter virtual networks that have internet-facing endpoints. Azure DDoS Protection automatically tunes to help protect your specific Azure resources and provides layer 3 and layer 4 mitigation. For web application protection at layer 7, WAF provides complementary defense.
76
-
77
-
There are two tiers to consider:
78
-
79
-
-**DDoS IP Protection** — Protects specific public IP addresses; suited for smaller or targeted deployments.
80
-
-**DDoS Network Protection** — Covers entire virtual networks with advanced mitigation, analytics, and integration for larger enterprise environments.
47
+
A strong network design applies defense-in-depth by layering multiple security controls. MCSB v2 controls NS-2 through NS-6 define the specific controls to evaluate. Assess whether the design includes:
81
48
82
-
## Evaluate private connectivity and reduced exposure
83
-
84
-
MCSB v2 controls NS-2 and NS-9 address private connectivity. A key evaluation criterion is whether the design minimizes the attack surface by reducing exposure to the public internet.
85
-
86
-
### Azure Private Link and private endpoints
87
-
88
-
Evaluate whether the design uses [Azure Private Link](/azure/private-link/private-link-overview) to access Azure PaaS services like Azure Storage and Azure SQL Database over private endpoints within the virtual network. This approach:
89
-
90
-
- Removes public internet access to service resources
91
-
- Keeps traffic on the Microsoft Azure backbone network
92
-
- Protects against data exfiltration by mapping a private endpoint to a specific resource instance rather than the entire service
93
-
94
-
For a security architect, the presence of private endpoints in a design is a strong indicator of least-exposure principles.
95
-
96
-
### Azure Bastion for secure remote access
97
-
98
-
Evaluate how the design handles administrative access to virtual machines. Designs that expose RDP or SSH ports directly to the internet present significant risk. Azure Bastion provides secure RDP/SSH connectivity through the Azure portal over TLS, without requiring public IP addresses on VMs. Check that the design uses Azure Bastion and combines it with just-in-time VM access in Microsoft Defender for Cloud to limit when ports are open.
99
-
100
-
### Hybrid connectivity
101
-
102
-
For hybrid environments, evaluate whether the design avoids sending sensitive traffic over the public internet. Azure ExpressRoute provides dedicated, private WAN connectivity between on-premises networks and Azure. Verify that the design uses ExpressRoute for sensitive or high-bandwidth workloads and that it terminates at the appropriate point relative to the perimeter firewall.
49
+
-**[Azure Firewall](/azure/firewall/overview)** as the central egress and east-west filtering point, with Premium features (TLS inspection and IDPS) for environments that require deep packet inspection.
50
+
-**[Azure Web Application Firewall (WAF)](/azure/web-application-firewall/overview)** on Application Gateway or Azure Front Door for Layer 7 protection against OWASP top threats on web-facing applications.
51
+
-**[Azure DDoS Protection](/azure/ddos-protection/ddos-protection-overview)** on perimeter VNets with internet-facing endpoints. Choose DDoS IP Protection for targeted deployments or DDoS Network Protection for enterprise-wide coverage.
52
+
-**[Azure Private Link](/azure/private-link/private-link-overview)** to access PaaS services through private endpoints, removing public internet exposure and keeping traffic on the Azure backbone.
53
+
-**[Azure Bastion](/azure/bastion/bastion-overview)** for secure RDP/SSH access without exposing management ports, combined with just-in-time (JIT) VM access to limit when ports are open.
54
+
-**Azure ExpressRoute** for hybrid connectivity that keeps sensitive traffic off the public internet.
103
55
104
56
## Evaluate identity-aware network security with Global Secure Access
105
57
106
-
Microsoft's Security Service Edge (SSE) solution — comprising Microsoft Entra Internet Access and Microsoft Entra Private Access under the unified [Global Secure Access](/entra/global-secure-access/overview-what-is-global-secure-access) platform — extends security controls beyond the traditional network perimeter with identity-centric network security.
107
-
108
-
Global Secure Access integrates with Microsoft Entra Conditional Access to enforce policies based on user identity, device compliance, location, and risk level at the network layer. This approach aligns with Zero Trust by verifying explicitly at the point of access.
58
+
Microsoft's Security Service Edge (SSE) solution — [Global Secure Access](/entra/global-secure-access/overview-what-is-global-secure-access) — extends security controls beyond the traditional network perimeter by tying enforcement directly to identity. It comprises two components: Microsoft Entra Internet Access for outbound internet and Microsoft 365 traffic, and Microsoft Entra Private Access for Zero Trust Network Access to private resources.
109
59
110
60
When evaluating a design that includes Global Secure Access, assess whether:
111
61
112
-
-**Traffic forwarding profiles** are configured to route Microsoft 365 traffic, internet traffic, and private application traffic through the appropriate security controls
113
-
-**Web content filtering** policies restrict access to risky or inappropriate web categories
114
-
-**Conditional Access policies** are linked to security profiles to enforce identity-aware access decisions on network traffic
62
+
-**Traffic forwarding profiles** route Microsoft 365 traffic, internet traffic, and private application traffic through the appropriate security controls.
63
+
-**Web content filtering** policies restrict access to risky or inappropriate web categories.
64
+
-**Conditional Access policies** are linked to security profiles to enforce identity-aware access decisions.
65
+
-**The compliant network check** is required for Microsoft Entra-integrated applications to mitigate token theft.
66
+
-**Private Access** replaces or complements VPN with identity-verified, per-application connectivity to on-premises resources.
115
67
116
-
## Evaluate network monitoring and posture management
117
-
118
-
A network design is incomplete without continuous visibility and monitoring. MCSB v2 controls NS-7 and NS-8 emphasize centralized network security management and detecting insecure protocols. Evaluate whether the design includes:
68
+
Later units in this module cover Internet Access and Private Access evaluation in detail.
119
69
120
-
-**Microsoft Defender for Cloud** networking recommendations and the interactive network map for visualizing topology, identifying unprotected resources, and surfacing risk-based recommendations.
121
-
-**Azure Network Watcher** tools such as NSG flow logs, packet capture, and Traffic Analytics for real-time and historical analysis of traffic patterns.
122
-
-**Centralized logging** that sends firewall, NSG flow, and DDoS diagnostic logs to Azure Monitor or Microsoft Sentinel.
70
+
## Evaluate network monitoring and posture management
123
71
124
-
Without monitoring, security gaps in the network design go undetected, reducing the effectiveness of the security controls in place.
72
+
A network design is incomplete without continuous visibility. MCSB v2 controls NS-7 and NS-8 emphasize centralized network security management and detecting insecure protocols. Evaluate whether the design includes:
125
73
126
-
## Learn more
74
+
-**Microsoft Defender for Cloud** networking recommendations, attack path analysis, and adaptive network hardening for continuous posture assessment.
75
+
-**VNet flow logs** and **Traffic Analytics** for traffic pattern analysis across the environment.
76
+
-**Azure Firewall structured logs** with IDPS and threat intelligence logging enabled.
77
+
-**Centralized SIEM integration** that sends network logs to Microsoft Sentinel for cross-source correlation and incident detection.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/2-design-solutions-network-segmentation.md
-9Lines changed: 0 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,12 +99,3 @@ Beyond VNet and subnet boundaries, design microsegmentation within individual wo
99
99
-**NSG rules between application tiers** — For a three-tier application, allow only the web tier to communicate with the application tier, and only the application tier to communicate with the database tier. Deny all other inter-tier traffic.
100
100
-**Private endpoints** — Use [Azure Private Link](/azure/private-link/private-link-overview) to access PaaS services through private endpoints within the VNet, eliminating public internet exposure and mapping each endpoint to a specific resource instance to prevent data exfiltration to other accounts.
101
101
-**Azure Bastion** — Replace direct RDP/SSH access with [Azure Bastion](/azure/bastion/bastion-overview), which provides secure remote access over TLS through the Azure portal without exposing management ports.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/3-design-solutions-traffic-filtering-network-security-groups.md
-11Lines changed: 0 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,14 +90,3 @@ Designing NSG rules is only effective when you can verify and monitor how they f
90
90
-**Traffic Analytics** — Processes flow log data to provide insights into traffic patterns, top talkers, security threats, and bandwidth consumption across your network.
91
91
-**IP flow verify** — An Azure Network Watcher capability that tests whether a specific packet is allowed or denied to or from a VM, identifying which NSG rule is responsible. Use this tool to troubleshoot connectivity issues.
92
92
-**Effective security rules** — Shows the aggregate of all NSG rules applied to a network interface, including default rules and rules from both subnet and NIC-level NSGs. Review effective rules to verify that your intended filtering is in place.
93
-
94
-
Designing solutions for network monitoring is covered in a subsequent unit.
95
-
96
-
## Learn more
97
-
98
-
-[Network security groups overview](/azure/virtual-network/network-security-groups-overview)
99
-
-[How network security groups filter network traffic](/azure/virtual-network/network-security-group-how-it-works)
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-network-security/includes/4-design-solutions-network-posture-management.md
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,11 +74,3 @@ Designing a posture management solution also requires governance mechanisms that
74
74
75
75
**Azure Policy** provides the enforcement layer. Use built-in or custom policy definitions to deny the creation of resources that violate your network standards, such as subnets without NSGs, VNets without DDoS protection, or VMs with public IP addresses in production subscriptions. Combine policy with Defender for Cloud recommendations to create a closed loop of detection and prevention.
76
76
77
-
## Learn more
78
-
79
-
-[What is Microsoft Defender for Cloud?](/azure/defender-for-cloud/defender-for-cloud-introduction)
0 commit comments