azure:az-500:platform_protection

Platform Protection

  • Secure the connectivity of hybrid networks
  • Secure the connectivity of virtual networks
  • Create and configure Azure Firewall
  • Create and configure Azure Firewall Manager
  • Create and configure Azure Application Gateway
  • Create and configure Azure Front Door
  • Create and configure Web Application Firewall (WAF)
  • Configure a resource firewall, including storage account, Azure SQL, Azure Key Vault, or Azure
  • App Service
  • Configure network isolation for Web Apps and Azure Functions
  • Implement Azure Service Endpoints
  • Implement Azure Private Endpoints, including integrating with other services
  • Implement Azure Private Links
  • Implement Azure DDoS Protection
  • Configure Endpoint Protection for virtual machines (VMs)
  • Implement and manage security updates for VMs
  • Configure security for container services
  • Manage access to Azure Container Registry
  • Configure security for serverless compute
  • Configure security for an Azure App Service
  • Configure encryption at rest
  • Configure encryption in transit

Perimeter Security

DDoS Protection blocks attack traffic and forwards the remaining traffic to its intended destination. Within a few minutes of attack detection, you’ll be notified with Azure Monitor metrics. By configuring logging on DDoS Protection Standard telemetry, you can write the logs to available options for future analysis. Azure Monitor retains metric data for DDoS Protection Standard for 30 days.
  • Azure Firewall has built-in high-availability and scalability, so no additional load-balancers are needed.
    • Has built-in AZ redundancy capabilities
  • Azure Firewall supports three types of rules, NAT, network and application.
  • Network rules are applied first then application.
  • Rules are terminating, meaning once a matching rule is found for traffic no other matching rules are applied.
  • Packets are denied by default.
  • By default, there is an implicit network allow rule for DNAT rules.
  • Service Tags can be used (for Azure services) in firewall rules in place of IPs for Azure services to simplify things by abstracting away the need to specify IPs.
  • FQDN Tags can be used in firewall rules to allow traffic to all FQDNs that are part of the tag.
  • TLS inspection
  • IDPS
  • URL filtering - extends standard tier FQDN capabilities to handle full URL
  • web categories - allows filtering based on categories of website content (e.g. social media, gambling, etc.)
  • With Azure Firewall Manager you can centrally deploy and configure multiple Azure Firewall instances that span different Azure regions and subscriptions.

Application Gateway

Front Door

Application Gateway vs Front Door

While both Front Door and Application Gateway are layer 7 (HTTP/HTTPS) load balancers, the primary difference is that Front Door is a non-regional service whereas Application Gateway is a regional service.

Network Security Groups (NSGs)

  • NSGs can be applied at the subnet or NIC level
  • In addition to inter-subnet traffic NSG rules also effect intra-subnet traffic.

Application Security Groups

  • Unlike NSGs, ASGs use references to NICs instead of IP addresses, so the IPs are abstracted away.

Service Endpoints and Private Endpoints

  • Service Endpoints allow you to restrict access to your PaaS resources to traffic coming from your Azure Virtual Network. By default many Azure services allow access from the Internet to the service's public endpoint/IP. In many cases this is not needed and it reduces the attack surface to only allow access from select customer networks.
  • Service Endpoints makes it so the source IP used by a VM to access public Azure services (e.g. Blob Storage) is a private IP from the VM VNet. The service/target IP is still a public address.
  • Be mindful of service firewall rules that are using the public source IPs. Those will need to be adjusted to work for private IPs.
  • Service Endpoints are configured per subnet.
  • There is no additional cost for Service Endpoints
  • When a Forced Tunnel is used the service traffic is exempt from going through the tunnel.
    • The Service Endpoint route takes a higher precedence than the default route.

  • Private Endpoint allows you to connect your virtual network to services in Azure without a public IP address at the source or destination.
  • The key difference between Private Link and Service Endpoints is that with Private Link you are injecting the multi-tenant PaaS resource into your virtual network.
  • With Service Endpoints, traffic still leaves your Vnet and hits the public endpoint of the PaaS resource, with Private Link the PaaS resource sits within your Vnet and gets a private IP on your Vnet. When you send traffic to the PaaS resource, it does not leave the virtual network.

§

Forced Tunneling

Forced tunneling lets you redirect or “force” all Internet-bound traffic back to your on-premises location via a Site-to-Site VPN tunnel for inspection and auditing.

This is sometimes referred to as back hauling.

Disk Encryption

  • Windows uses BitLock for disk encryption
  • Linux uses DM-Crypt for disk encryption
  • Disks are stored as page blobs in storage accounts
  • Customer managed keys can be used and kept in Azure Key Vault

Container Security

  • azure/az-500/platform_protection.txt
  • Last modified: 2022/07/22 00:42
  • by mmuze