Learning Path 4 - Part 2
Learning Path 4 - Part 2
on Azure
Azure 900 Test Preparation
Learning Objectives
Identify the layers that make up a defense in depth strategy.
Explain how Azure Firewall enables you to control what traffic is allowed on
the network.
Configure network security groups to filter network traffic to and from Azure
resources within a Microsoft Azure virtual network.
Explain how Azure DDoS Protection helps protect your Azure resources from
DDoS attacks.
Defense in Depth - to protect information and prevent if from being stolen from unauthorized
users
Layered Strategy - removed reliance on single layer & provides telemetry data to act upon
Azure Firewall
Important Features
o Stateful - complete context of network transaction
o Central location (interface) to create policies, view logs
o Integrated with Azure Monitor (including logging)
o Inbound and outbound rules
o DNAT support (Destination Network Address Translation)
o Standard Azure-ness
High availability
Scalability
Configurability
o Application Rules - define fully qualified domain names that can be accessed from a
subnet
o Network Rules - define source address, protocol, destination port and destination
address
o Network Address Translation (NAT) rules - think IP Addresses and Ports
Azure Application Gateway also has a firewalled called web application firewall (WAF)
Azure Front Door (WAF)
Azure Content Delivery Network (also WAF)
Features
o Discards DDoS traffic at network edge
o Reduces illegitimate traffic => lower operating costs
Tiers
o Basic - free
o Standard - Additional featured tuned to azure VM resources
Volumetric Attacks
Protocol Attacks
Resource Layer
Enables filtering of network traffic to/from resources within an azure virtual network
(Internal Firewall)
Can use security rules for inbound/outbound based on IP/Port/protocol
NSGs have priority number to rank priority
Exercise
So basically, use Azure Firewall and then either security groups (NSGs) or application level firewall
(WAF)
Knowledge Check