Design and Implement Network Security Flashcards
What are Service Tags?
Service tags are used to identify groups of public IP addresses for Azure resources
What are Application Security Groups?
Application security groups are a way to tag a set of virtual machines or resources on a virtual network to be used in an NSG rule
What is Microsoft Peering?
Microsoft peering is used to connect an on-premises network to Azure public resources
What is a service endpoint?
A service endpoint is used to connect resources on a virtual network to public Azure resources over the Microsoft backbone.
What is Azure Firewall?
Azure Firewall is a network virtual appliance that can inspect and block network traffic entering and leaving a virtual network.
What is ExpressRoute?
ExpressRoute is used to enable high bandwidth and private connections between Azure and on-premises.
What is Azure Front Door
Azure Front Door is used to load balance web app traffic globally.
What is an Application Gateway
Application Gateway is used to load balance web app traffic regionally.
What Layer do Application Rules access?
Application rules are for L7 access.
You plan to deploy Azure Front Door Web Application Firewall (WAF).
You need to configure WAF to use a feature that is often updated. The solution must meet the following requirements:
Contains the latest security rules.
Detects the latest threats.
Minimizes false positives.
What should you use?
The Microsoft Threat Intelligence Collection is part of managed rules, which are often updated by Microsoft and are part of Azure Front Door Premium. No other options meet the requirements.
Azure Bastion requirements
The Bastion host is deployed in the virtual network that contains the AzureBastionSubnet subnet that has a minimum /26 prefix.
The user connects to the Azure portal using any HTML5 browser.
The user selects the virtual machine to connect to.
With a single click, the RDP/SSH session opens in the browser.
No public IP is required on the Azure VM.
Private IP ranges
Class A: 10.0. 0.0 to 10.255. 255.255.
Class B: 172.16. 0.0 to 172.31. 255.255.
Class C: 192.168. 0.0 to 192.168. 255.255
NS-1: Establish network segmentation boundaries
Security Principle: Ensure that your virtual network deployment aligns to your enterprise segmentation strategy defined in the GS-2 security control. Any workload that could incur higher risk for the organization should be in isolated virtual networks.
NS-2: Secure cloud services with network controls
Security Principle: Secure cloud services by establishing a private access point for the resources. You should also disable or restrict access from public network when possible.
NS-3: Deploy firewall at the edge of enterprise network
Security Principle: Deploy a firewall to perform advanced filtering on network traffic to and from external networks. You can also use firewalls between internal segments to support a segmentation strategy. If required, use custom routes for your subnet to override the system route when you need to force the network traffic to go through a network appliance for security control purpose.