Skip to content

Commit 79ce495

Browse files
committed
Learn Editor: Update traffic-analytics-zero-trust.md
1 parent 05ba84f commit 79ce495

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

articles/network-watcher/traffic-analytics-zero-trust.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
---
2-
32
title: Apply Zero Trust Principles to Segment Azure Network through Traffic Analytics
43
description: Learn how to use Azure Traffic Analytics to apply Zero Trust principles, segment networks, and detect security risks in your Azure environment.
54
author: shijaiswal # GitHub alias
@@ -14,6 +13,8 @@ ms.date: 06/04/2025
1413

1514

1615

16+
## What is Zero Trust ?
17+
1718
Zero Trust is a security strategy. It isn't a product or a service, but an approach in designing and implementing the following set of security principles.
1819

1920
|Principle|Description|
@@ -66,7 +67,17 @@ Traffic patterns are visualized using built-in dashboards, with flexibility to c
6667

6768
- **Detect compromised IPs/resources:** Use traffic analytics to identify potentially compromised IP addresses or resources, helping to strengthen security and maintain performance.
6869

69-
The following sections highlight key scenarios where traffic analytics supports micro-segmentation to help implement Zero Trust principles in Azure.
70+
#### How to deploy Zero Trust Segmentation (ZTS) with Traffic Analytics?
71+
72+
As a first critical step to deploy Zero Trust Segmentation over existing or new Azure deployment user needs to
73+
74+
- **Start with default deny posture**: It starts with removing or disabling all existing inbound and outbound rules that allows traffic broadly (eg., Allow All, Allow, etc.,) and adding explicit deny rules for both inbound and outbound traffic.
75+
76+
- **Observe the patterns through Traffic Analytics**: Analyze Flow Logs to identify the traffic patterns that are essential for your workload.
77+
78+
- **Create selective allow rules**: Based on insights from Traffic Analytics, define rules that explicitly allow only the observed and necessary traffic. This approach ensures that only validated, required traffic is permitted, aligning with Zero Trust principle of Verifying explicitly.
79+
80+
The following sections highlight key scenarios where traffic analytics supports segmentation to help implement Zero Trust principles in Azure.
7081

7182
## Scenario 1: Detect traffic flowing through risky or restricted regions
7283

0 commit comments

Comments
 (0)