Restricting Network Access in Azure

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 51 minutes
Difficulty
Beginner
CEU/CPE
4
Video Transcription
00:00
Let's look at the azure tools that can help you with your network protection.
00:05
We discussed the layered approach to security at the beginning of the module.
00:09
Protecting the perimeter of your network is an essential part of this approach
00:13
you can use as your security center to identify the resources that are publicly exposed but are not protected by a firewall.
00:21
A firewall is a device or service that inspects the network traffic and grants access. Based on the originated I P address network protocol and port.
00:32
You can create firewall rules that specify the I P address or IP ranges, protocols and ports. And the firewall will ensure that only allow requests are forwarded to their target resources
00:44
as you provide several firewall options for you to protect your network from external attacks.
00:50
As your firewall is a fully managed service that protects resources in your virtual network,
00:55
it has a built in high availability, and it can scale on demand
01:00
as your firewall is a layer three firewall and can protect you not only from http slash https attacks, but also other protocol attacks like ssh remote desktop protocol, file transfer protocol and so on.
01:15
We've discussed application gateway. In the past,
01:19
it has a built in Web application firewall that can protect your Web workloads from common attacks like cross site scripting and SQL injection.
01:27
The azure marketplace has offers for third party network virtual appliances that are similar to hardware appliances and offer advanced configurations for applications and solutions that require granular configuration.
01:42
Any resource exposed to the Internet is prone to distributed denial of service attacks.
01:48
The Attackers goal is to overwhelm the endpoints by sending so many requests that the resource becomes unresponsive.
01:55
Azure DDOS protection service can be used to provide defense against DDOS attacks
02:00
as Adidas monitors the traffic of the network perimeter.
02:06
If an attack is detected, you'll be notified using azure monitor metrics.
02:12
The service comes with two tiers. Basic is automatically enabled as part of the azure platform.
02:16
It uses the same algorithms that provide protection for all the other Microsoft services.
02:23
Standard provides additional capabilities that are based on the traffic and resources in your azure virtual network.
02:30
As Adidas uses machine learning to learn the communication patterns between the resources deployed in the Vienna and can mitigate various types of attack like volumetric ones where the attacker tries to simulate legit traffic
02:43
protocol attacks where protocol weaknesses are exploited or resource layer at attacks where the application traffic is disrupted.
02:53
Protection of the perimeter is just one of the layers of security that you can implement.
02:57
You also need to think of protection inside your network and prevent the lateral movement of an attacker if one of your existing defenses fails.
03:05
As we discussed previously, network security groups are critical to restricting the communication between your internal resources
03:14
network. Security groups are resourced based firewalls that allow you to create inbound and outbound routes based on I P addresses, protocols and ports.
03:23
It's recommended to deny all communication between systems that are not essential for the work of your application.
03:30
You can remove the public access to your azure services by restricting the access to the service endpoint, practically eliminating the traffic to the V net. Only
03:38
communication with your on premises workloads can be configured. Be the virtual private network that communicates with the VPN device on premises or via dedicated private connection using an express route that allows you to also have private connections to other Microsoft services like Office 3 65 and Dynamics 3 65.
04:00
This limits the exposure to those services as well.
04:04
In the next video, we'll see how you can use an azure advanced threat protection to detect threats on your cloud infrastructure.
Up Next