Skip to content

Commit 407935e

Browse files
committed
updated link.
1 parent 279b252 commit 407935e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/ddos-protection/ddos-optimization-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Cost optimization for DDoS protection requires understanding your risk profile a
3131
| **Develop a comprehensive asset inventory** that catalogs all public IP addresses and their business criticality levels. | A complete inventory enables risk-based protection decisions and prevents both over-provisioning expensive protection and leaving critical assets unprotected. You can prioritize protection investments based on actual business impact. |
3232
| **Establish clear accountability** for protection decisions with defined roles for security, operations, and finance teams. | Clear accountability ensures protection decisions consider both security requirements and budget constraints. Collaborative decision-making prevents siloed choices that might compromise security or exceed budgets. |
3333
| **Create realistic budgets** that account for both immediate protection needs and planned growth in public-facing resources. | Proper budgeting enables predictable protection costs and prevents reactive decisions during security incidents. You can plan protection expansion as your infrastructure grows. |
34-
| **Implement [risk assessment frameworks](/azure/cloud-adoption-framework/govern/security-baseline/assess-cloud-risks)** that define minimum protection levels and standardized policies for different asset types. | Risk-based frameworks provide structured approaches to evaluate DDoS attack risks while ensuring consistent protection decisions. They help identify critical assets, assess vulnerabilities, and determine appropriate protection measures based on business impact and risk tolerance, preventing both under-protection of critical assets and over-protection of low-risk resources. |
34+
| **Implement [risk assessment frameworks](/azure/cloud-adoption-framework/govern/assess-cloud-risks)** that define minimum protection levels and standardized policies for different asset types. | Risk-based frameworks provide structured approaches to evaluate DDoS attack risks while ensuring consistent protection decisions. They help identify critical assets, assess vulnerabilities, and determine appropriate protection measures based on business impact and risk tolerance, preventing both under-protection of critical assets and over-protection of low-risk resources. |
3535

3636
## Choose the right protection model
3737

0 commit comments

Comments
 (0)