Skip to content

Commit 8ce0c64

Browse files
committed
update
1 parent d927122 commit 8ce0c64

File tree

10 files changed

+47
-9
lines changed

10 files changed

+47
-9
lines changed

articles/cloud-services-extended-support/enable-key-vault-virtual-machine.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: azure-cloud-services-extended-support
66
author: msmbaldwin
77
ms.author: mbaldwin
88
ms.reviewer: gachandw
9-
ms.date: 07/24/2024
9+
ms.date: 04/23/2025
1010
# Customer intent: As an IT administrator, I want to configure the Key Vault VM extension for Azure Cloud Services, so that I can automate certificate management and ensure timely updates for secured operations.
1111
---
1212

articles/security/fundamentals/encryption-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: security
77
ms.subservice: security-fundamentals
88
ms.topic: article
9-
ms.date: 04/26/2024
9+
ms.date: 04/23/2025
1010
ms.author: mbaldwin
1111
---
1212
# Azure encryption overview

articles/security/fundamentals/end-to-end.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: a5a7f60a-97e2-49b4-a8c5-7c010ff27ef8
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: conceptual
12-
ms.date: 06/28/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/feature-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: mbaldwin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: feature-availability
10-
ms.date: 06/27/2024
10+
ms.date: 04/23/2025
1111
---
1212

1313
# Cloud feature availability for commercial and US Government customers

articles/security/fundamentals/management-monitoring-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 5cf2827b-6cd3-434d-9100-d7411f7ed424
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 06/20/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/operational-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: rkarlin
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 06/27/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/paas-deployments.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article
10-
ms.date: 06/27/2024
10+
ms.date: 04/23/2025
1111
ms.author: mbaldwin
1212

1313
---

articles/security/fundamentals/pen-testing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.assetid: 695d918c-a9ac-4eba-8692-af4526734ccc
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 06/27/2024
11+
ms.date: 04/23/2025
1212
ms.author: mbaldwin
1313
---
1414

articles/security/fundamentals/technical-capabilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: rkarlin
88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 06/28/2024
11+
ms.date: 04/23/2025
1212
ms.author: mbaldwin
1313

1414
---
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Secure your Azure Virtual Network deployment
3+
description: Learn how to secure Azure Virtual Network, with best practices for network configuration, segmentation, monitoring, and access control.
4+
author: msmbaldwin
5+
ms.author: mbaldwin
6+
ms.service: security
7+
ms.topic: conceptual
8+
ms.custom: horz-security
9+
ms.date: 04/23/2025
10+
---
11+
12+
# Secure your Azure Virtual Network deployment
13+
14+
Azure Virtual Network (VNet) is the fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the internet, and on-premises networks. However, to maintain a strong security posture, you must implement proper configurations and controls for your virtual networks.
15+
16+
This article provides guidance on how to best secure your Azure Virtual Network deployment.
17+
18+
## Network security
19+
20+
Network security for Azure Virtual Networks involves establishing proper network segmentation, implementing traffic filtering through Network Security Groups, and ensuring that communication between resources follows the principle of least privilege. Proper network security configurations help minimize the attack surface and protect your workloads from unauthorized access.
21+
22+
- **Establish network segmentation boundaries using Network Security Groups**: Use Network Security Groups (NSGs) to control traffic flow to and from Azure resources in your virtual network. NSGs allow you to filter network traffic by source and destination IP address, port, and protocol, enabling you to implement security rules that follow the principle of least privilege. For more details, see [Restrict network access to resources](/azure/virtual-network/tutorial-restrict-network-access-to-resources).
23+
24+
- **Isolate and segment workloads using Virtual Networks (VNets)**: Create separate virtual networks or subnets for workloads with different security requirements. This segmentation helps contain security breaches and minimizes the potential impact of an attack by limiting lateral movement within your environment. Consider factors such as regulatory requirements, administrative boundaries, and workload risk levels when designing your segmentation strategy. For more details, see [Azure Virtual Network](/azure/virtual-network/).
25+
26+
- **Control traffic flow with Network Security Groups (NSGs)**: Apply NSGs to control inbound and outbound traffic for virtual machines and subnets within VNets. Use a "deny by default, permit by exception" approach to restrict traffic flow and protect sensitive resources. Regularly review and audit your NSG rules to ensure they remain aligned with your security requirements. For more details, see [Network Security Groups](/azure/virtual-network/network-security-groups-overview).
27+
28+
## Asset management
29+
30+
Effective asset management for Azure Virtual Networks involves maintaining visibility into your network resources, enforcing consistent configurations, and ensuring compliance with organizational policies. By implementing proper asset management practices, you can reduce configuration drift and maintain a strong security posture.
31+
32+
- **Use only approved services with Azure Policy**: Implement Azure Policy to audit and enforce configurations across your Azure Virtual Network resources. Azure Policy helps you maintain compliance with your organization's standards by evaluating your resources against defined rules. Use Microsoft Defender for Cloud to configure Azure Policy and create alerts when configuration deviations are detected. Implement [deny] and [deploy if not exists] policy effects to enforce secure configurations across your virtual network resources. For more details, see [Azure Policy built-in definitions for Azure Virtual Network](/azure/virtual-network/policy-reference).
33+
34+
## Logging and threat detection
35+
36+
Comprehensive logging and monitoring are essential for identifying potential security threats in your Azure Virtual Network. By capturing detailed activity logs and implementing proper monitoring, you can detect suspicious activities, troubleshoot issues, and maintain an audit trail for compliance purposes.
37+
38+
- **Enable logging for security investigation with Azure Resource Logs**: Configure Azure Resource Logs for your Virtual Network to capture detailed information about network traffic and security events. These logs provide valuable insights for security investigations and compliance reporting. Send the logs to Azure Monitor, a Log Analytics workspace, or a storage account for long-term retention and analysis. Implement log retention policies that align with your organization's compliance requirements. For more details, see [Azure Monitor resource logs](/azure/azure-monitor/platform/platform-logs-overview).

0 commit comments

Comments
 (0)