Skip to content

Commit 5bc36c9

Browse files
committed
added template and AI generated export from MCSB
1 parent 8155373 commit 5bc36c9

File tree

2 files changed

+105
-0
lines changed

2 files changed

+105
-0
lines changed
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: Secure your Virtual Network deployment
3+
description: Learn how to secure Azure Virtual Network with best practices for network isolation, access control, monitoring, and threat protection.
4+
author: msmbaldwin
5+
ms.author: mbaldwin
6+
ms.service: virtual-network
7+
ms.topic: conceptual
8+
ms.custom: horz-security
9+
ms.date: 01/01/2024
10+
ai-usage: ai-assisted
11+
---
12+
13+
# Secure your Virtual Network deployment
14+
15+
Azure Virtual Network is the fundamental building block for your private network in Azure, enabling Azure resources to securely communicate with each other, the internet, and on-premises networks. When deploying virtual networks, you must implement security controls to protect your network infrastructure, control traffic flow, and prevent unauthorized access to your resources.
16+
17+
This article provides guidance on how to best secure your Azure Virtual Network deployment.
18+
19+
## Network security
20+
21+
Network security for Virtual Networks focuses on controlling traffic flow, implementing network segmentation, and protecting against external threats. Proper network security controls help isolate workloads, prevent lateral movement, and defend against distributed denial-of-service attacks.
22+
23+
- **Segment workloads using Network Security Groups (NSGs)**: Apply NSGs to subnets and network interfaces to control inbound and outbound traffic based on source IP, destination IP, port, and protocol. Use a "deny by default, permit by exception" approach to minimize attack surface. See [Network Security Groups](/azure/virtual-network/network-security-groups-overview).
24+
25+
- **Enable NSG flow logs for traffic monitoring**: Configure NSG flow logs to capture information about IP traffic flowing through your network security groups. Send these logs to Azure Monitor Log Analytics and use Traffic Analytics to visualize network activity and identify security threats. See [NSG flow logs](/azure/network-watcher/network-watcher-nsg-flow-logging-portal).
26+
27+
- **Deploy Azure Firewall with threat intelligence**: Use Azure Firewall with threat intelligence-based filtering enabled to automatically alert on and deny traffic to known malicious IP addresses and domains. Position the firewall at network boundaries to provide centralized protection. See [Azure Firewall threat intelligence](/azure/firewall/threat-intel).
28+
29+
- **Enable DDoS Protection Standard**: Activate DDoS Protection Standard on your virtual networks to defend against distributed denial-of-service attacks. This service provides enhanced DDoS mitigation capabilities and real-time monitoring for your public IP addresses. See [Azure DDoS Protection Standard](/azure/ddos-protection/manage-ddos-protection).
30+
31+
- **Implement network-based intrusion detection**: Deploy network virtual appliances with IDS/IPS capabilities or use Azure Firewall Premium with intrusion detection and prevention system (IDPS) features to monitor and block malicious network traffic. See [Azure Firewall Premium IDPS](/azure/firewall/premium-features#idps).
32+
33+
- **Use service tags to simplify security rules**: Replace specific IP addresses with service tags in your NSG rules to allow communication with Azure services while maintaining security. Service tags are automatically updated by Microsoft as IP ranges change. See [Service tags](/azure/virtual-network/service-tags-overview).
34+
35+
- **Configure packet capture for forensic analysis**: Enable packet capture on virtual machines or use VPN Gateway packet capture to record network traffic for security analysis and incident investigation. See [Network Watcher packet capture](/azure/network-watcher/network-watcher-packet-capture-overview).
36+
37+
## Identity management
38+
39+
Identity management for Virtual Networks involves controlling access to network resources and ensuring that only authorized users and services can modify network configurations. Proper identity controls prevent unauthorized network changes and maintain network security posture.
40+
41+
- **Use Azure RBAC for network resource access**: Assign appropriate built-in roles such as Network Contributor or custom roles with specific permissions to control who can create, modify, or delete virtual networks and related resources. Follow the principle of least privilege. See [Azure RBAC for networking](/azure/role-based-access-control/built-in-roles#networking).
42+
43+
- **Enable Azure Active Directory integration**: Use Azure AD as the centralized identity provider for managing access to network resources and related Azure services. This ensures consistent authentication and authorization across your network infrastructure.
44+
45+
- **Implement conditional access for network administrators**: Configure conditional access policies to require multi-factor authentication and restrict access to network management operations based on user location, device compliance, and risk level. See [Conditional Access](/azure/active-directory/conditional-access/overview).
46+
47+
## Privileged access
48+
49+
Privileged access management for Virtual Networks focuses on securing administrative operations and ensuring that network configuration changes are performed by authorized personnel with appropriate oversight and monitoring.
50+
51+
- **Enforce multi-factor authentication for network administrators**: Require MFA for all users with network administration privileges to add an additional security layer beyond passwords. This significantly reduces the risk of credential-based attacks. See [Azure AD MFA](/azure/active-directory/authentication/concept-mfa-howitworks).
52+
53+
- **Use just-in-time access for network operations**: Implement Azure AD Privileged Identity Management to provide time-limited access to network administration roles. This reduces the window of exposure for privileged credentials. See [Privileged Identity Management](/azure/active-directory/privileged-identity-management/pim-configure).
54+
55+
- **Monitor privileged network activities**: Enable logging and monitoring for all privileged network operations including NSG changes, route table modifications, and firewall rule updates. Use Azure Activity Log and Azure Monitor to track administrative actions. See [Azure Activity Log](/azure/azure-monitor/essentials/activity-log).
56+
57+
## Data protection
58+
59+
Data protection for Virtual Networks involves securing data in transit across your network infrastructure and ensuring that network communications are encrypted and protected from interception or tampering.
60+
61+
- **Enable encryption in transit**: Ensure all network traffic uses encryption protocols such as TLS 1.2 or higher, IPsec for VPN connections, and encrypted protocols for application communications. Azure provides encryption by default for traffic between Azure datacenters. See [Encryption in transit](/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit).
62+
63+
- **Use private endpoints for Azure services**: Deploy private endpoints to access Azure PaaS services over private IP addresses within your virtual network, eliminating exposure to the public internet and reducing data exfiltration risks. See [Private endpoints](/azure/private-link/private-endpoint-overview).
64+
65+
- **Implement network access controls for sensitive data**: Use NSGs and Azure Firewall to restrict access to subnets and resources containing sensitive data. Apply defense-in-depth principles with multiple layers of network security controls.
66+
67+
## Logging and threat detection
68+
69+
Comprehensive logging and threat detection for Virtual Networks enables security monitoring, incident response, and compliance reporting. Proper logging helps identify security threats and provides forensic capabilities for incident investigation.
70+
71+
- **Centralize log collection with Azure Monitor**: Configure diagnostic settings to send virtual network logs, NSG flow logs, and Azure Firewall logs to Azure Monitor Log Analytics workspace for centralized analysis and correlation. See [Azure Monitor](/azure/azure-monitor/overview).
72+
73+
- **Enable Microsoft Defender for Cloud**: Use Microsoft Defender for Cloud to monitor your virtual network resources for security misconfigurations and threats. Enable the enhanced security features for comprehensive protection. See [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction).
74+
75+
- **Configure security alerts and notifications**: Set up Azure Monitor alerts for critical network security events such as NSG rule changes, unusual traffic patterns, or firewall blocks. Configure action groups to automatically notify security teams. See [Azure Monitor alerts](/azure/azure-monitor/alerts/alerts-overview).
76+
77+
- **Use Microsoft Sentinel for advanced threat detection**: Connect your virtual network logs to Microsoft Sentinel for advanced security analytics, threat hunting, and automated response capabilities. See [Microsoft Sentinel](/azure/sentinel/quickstart-onboard).
78+
79+
- **Enable DNS logging**: Configure DNS query logging for Azure DNS or custom DNS servers to detect DNS-based attacks and data exfiltration attempts. Monitor for suspicious domain queries and DNS tunneling activities.
80+
81+
## Asset management
82+
83+
Asset management for Virtual Networks involves maintaining an inventory of network resources, implementing governance policies, and ensuring compliance with security standards. Effective asset management helps maintain security posture and enables rapid response to security incidents.
84+
85+
- **Use Azure Policy for governance**: Implement Azure Policy definitions to enforce security standards for virtual networks, such as requiring NSGs on subnets, mandating specific security rules, or preventing creation of public IPs. See [Azure Policy for virtual networks](/azure/virtual-network/policy-reference).
86+
87+
- **Tag network resources for organization**: Apply consistent tagging strategies to virtual networks, subnets, NSGs, and related resources to enable proper organization, cost management, and security policy enforcement. See [Resource tagging](/azure/azure-resource-manager/management/tag-resources).
88+
89+
- **Monitor resource configuration changes**: Use Azure Resource Graph to query and discover all networking resources across subscriptions. Set up alerts for unauthorized changes to critical network configurations. See [Azure Resource Graph](/azure/governance/resource-graph/first-query-portal).
90+
91+
- **Implement configuration management**: Use Azure Resource Manager templates or Bicep to define and deploy network configurations consistently. Store templates in version control and implement change management processes for network modifications.
92+
93+
## Backup and recovery
94+
95+
Backup and recovery for Virtual Networks focuses on preserving network configurations and ensuring rapid restoration of network connectivity in case of accidental deletion or configuration errors. While virtual networks themselves don't require traditional backups, configuration preservation is critical.
96+
97+
- **Export network configurations regularly**: Use Azure Resource Manager to export virtual network configurations as templates that can be stored and used for disaster recovery. Automate this process using Azure Automation or Azure DevOps pipelines. See [Export templates](/azure/azure-resource-manager/templates/export-template-portal).
98+
99+
- **Document network architecture**: Maintain comprehensive documentation of your network design, including IP address schemes, routing tables, security group rules, and connectivity requirements. Store this documentation in a secure, accessible location.
100+
101+
- **Test configuration restoration procedures**: Regularly test your ability to recreate virtual network configurations from exported templates or documentation to ensure recovery procedures work correctly and meet recovery time objectives.
102+
103+
- **Use Azure Backup for connected resources**: While virtual networks don't require backup, ensure that virtual machines and other resources connected to your networks are properly backed up with Azure Backup to maintain complete recovery capabilities. See [Azure Backup](/azure/backup/).

articles/virtual-network/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -210,6 +210,8 @@
210210
href: virtual-network-troubleshoot-cannot-delete-vnet.md
211211
- name: Security
212212
items:
213+
- name: Secure your Virtual Network
214+
href: secure-virtual-network.md
213215
- name: Azure Kubernetes network policies
214216
href: kubernetes-network-policies.md
215217
- name: Azure Policy Regulatory Compliance controls

0 commit comments

Comments
 (0)