Skip to content

Commit 3b0e978

Browse files
committed
stuff
1 parent dbc1f31 commit 3b0e978

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

articles/virtual-network/secure-virtual-network.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,12 @@ Network security for Virtual Networks focuses on controlling traffic flow, imple
4444

4545
- **Design with defense-in-depth principles**: Implement multiple layers of network security controls to create redundant protection. Use segmentation strategies that isolate critical workloads and apply different security measures at each network boundary to contain potential breaches.
4646

47+
- **Enable Virtual Network encryption**: Use Azure Virtual Network encryption to encrypt data in transit between virtual machines within the same virtual network and between regionally and globally peered virtual networks. This provides additional protection for sensitive data communications. For more information, see [Virtual Network encryption](/azure/virtual-network/virtual-network-encryption-overview).
48+
49+
- **Maintain updated security perimeter**: Regularly review and update security settings including NSGs, Application Security Groups, and IP address ranges. Outdated rules might not align with current network architecture or traffic patterns, potentially creating security gaps. For more information, see [Network Security Groups overview](/azure/virtual-network/network-security-groups-overview).
50+
51+
- **Limit public IP address usage**: Minimize the number of public IP addresses by using shared public IP addresses from services like Azure Front Door or Application Gateway. When public IPs are necessary, implement proper port management and request validation. For more information, see [Public IP addresses](/azure/virtual-network/ip-services/public-ip-addresses).
52+
4753
## Identity management
4854

4955
Identity management for Virtual Networks involves controlling access to network resources and ensuring that only authorized users and services can modify network configurations. Proper identity controls prevent unauthorized network changes and maintain network security posture.
@@ -58,6 +64,8 @@ Identity management for Virtual Networks involves controlling access to network
5864

5965
- **Regularly review and reconcile user access**: Perform regular access reviews to efficiently manage group memberships, access to enterprise applications, and role assignments. Ensure only active users have continued access to network management functions. For more information, see [Azure Identity Access Reviews](/azure/active-directory/governance/access-reviews-overview).
6066

67+
- **Apply principle of least privilege for network roles**: Configure role-based access control with a no-access mindset for network-related roles. Ensure users can only modify network settings as required by their job function to minimize potential security risks. For more information, see [Azure RBAC best practices](/azure/role-based-access-control/best-practices).
68+
6169
## Privileged access
6270

6371
Privileged access management for Virtual Networks focuses on securing administrative operations and ensuring that authorized personnel perform network configuration changes with appropriate oversight and monitoring.
@@ -130,6 +138,10 @@ Security testing for Virtual Networks ensures that implemented security controls
130138

131139
- **Test backup and recovery procedures**: Regularly test your ability to recreate virtual network configurations from exported templates or documentation to ensure recovery procedures work correctly and meet recovery time objectives.
132140

141+
- **Enable Virtual Network Verifier**: Use Virtual Network Verifier in Azure Virtual Network Manager in preproduction environments to test connectivity between resources and ensure they are reachable and not blocked by policies. For more information, see [Virtual Network Verifier](/azure/virtual-network-manager/concept-virtual-network-verifier).
142+
143+
- **Use Azure Chaos Studio for resilience testing**: Implement Azure Chaos Studio to simulate network connectivity disruptions and validate that security controls remain effective during failure scenarios. This ensures that security mechanisms continue to function properly even when the network experiences stress or partial outages. For more information, see [Azure Chaos Studio](/azure/chaos-studio/chaos-studio-overview).
144+
133145
## Backup and recovery
134146

135147
Backup and recovery for Virtual Networks focuses on preserving network configurations and ensuring rapid restoration of network connectivity if there's accidental deletion or configuration errors. While virtual networks themselves don't require traditional backups, configuration preservation is critical.
@@ -142,6 +154,8 @@ Backup and recovery for Virtual Networks focuses on preserving network configura
142154

143155
- **Backup connected resources and customer-managed keys**: While virtual networks don't require backup, ensure that virtual machines and other resources connected to your networks are properly backed up with Azure Backup to maintain complete recovery capabilities. If using customer-managed keys for encryption within your virtual network environment, ensure these keys are backed up in Azure Key Vault with appropriate retention and recovery procedures. For more information, see [Azure Backup](/azure/backup/).
144156

157+
- **Prepare redundant networking infrastructure**: Duplicate networking infrastructure in advance, especially for hybrid setups. Ensure that separate routes in different regions are ready to communicate with each other beforehand. Replicate and maintain consistent NSGs and Azure Firewall rules across both primary and disaster recovery sites. Avoid overlapping IP address ranges between production and disaster recovery networks to simplify network management and expedite transition during failover events.
158+
145159
## Incident response
146160

147161
Incident response for Virtual Networks involves establishing procedures to detect, respond to, and recover from security incidents affecting your network infrastructure. Proper incident response capabilities help minimize the impact of security breaches and ensure rapid restoration of services.

0 commit comments

Comments
 (0)