You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Navigate to [Publisher Support](https://support.microsoft.com/en-us/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16230&ccsid=636450758943226673) and sign in with your Microsoft credentials.
22
-
2. Select "Security Event" as the Problem Type and choose between the "Security Incident" and "Vulnerability" categories.
20
+
Visit the [Microsoft Security Response Center](https://msrc.microsoft.com/create-report) (MSRC) to report a security specific issue.
23
21
24
-

25
-
26
-
3. After you select the Problem Type and Category, click the '**Start request**' button. Provide the following information to help us better understand the issue.
27
-
28
-
i. What is the problem and/or vulnerability?
29
-
30
-
ii. For vulnerabilities, please provide the CVE (mitre.org) or the filled out CVSS3 v3 calculator (https://www.first.org/cvss/calculator/3.0).
31
-
32
-
iii. Is there a resolution or mitigation? If yes, then please provide the remediation steps.
33
-
34
-
iv. Do you have a message that you want to send to customers? We will work with you to craft an appropriate message if applicable.
35
-
36
-
4. Submission confirmation - Once you have submitted your issue, we will acknowledge receipt within one business day and assign your issue a priority and severity.
37
-
38
-
- If you need to communicate with us about your issue, use the confirmation number in all correspondence.
39
-
- You can view progress on your issue at any time.
40
-
41
-
5. What happens next? Depending on the issue and severity, the following steps may be taken:
42
-
43
-
- We will communicate the outcome of our assessment to you. Depending on the outcome, we may remove or request that you modify your offering. In this event, we will work with you to ensure that disruption to impacted customers is minimized.
44
-
- We will work with you to help mitigate the impact of the incident/vulnerability for our mutual customers.
22
+
You can also create a tailored, Azure support request in the Azure portal. Visit the Azure portal [here](https://ms.portal.azure.com/#create/Microsoft.Support). Follow the prompts to receive recommended solutions or to log a support request.
45
23
24
+
## Next steps
25
+
[MSRC](https://msrc.microsoft.com/create-report) is part of the defender community. Learn more about how MSRC helps to protect customers and the broader ecosystm.
Copy file name to clipboardExpand all lines: articles/security/fundamentals/network-best-practices.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,16 +2,16 @@
2
2
title: Best practices for network security - Microsoft Azure
3
3
description: This article provides a set of best practices for network security using built in Azure capabilities.
4
4
author: TerryLanfear
5
-
manager: barbkess
6
-
editor: TomShinder
5
+
manager: rkarlin
7
6
8
7
ms.assetid: 7f6aa45f-138f-4fde-a611-aaf7e8fe56d1
9
8
ms.service: security
9
+
ms.subservice: security-fundamentals
10
10
ms.topic: article
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: na
13
-
ms.date: 10/02/2019
14
-
ms.author: TomSh
13
+
ms.date: 01/28/2023
14
+
ms.author: terrylan
15
15
16
16
---
17
17
# Azure best practices for network security
@@ -49,14 +49,14 @@ Best practices for logically segmenting subnets include:
49
49
**Detail**: Use [CIDR](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing)-based subnetting principles to create your subnets.
50
50
51
51
**Best practice**: Create network access controls between subnets. Routing between subnets happens automatically, and you don't need to manually configure routing tables. By default, there are no network access controls between the subnets that you create on an Azure virtual network.
52
-
**Detail**: Use a [network security group](../../virtual-network/virtual-network-vnet-plan-design-arm.md) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets.
52
+
**Detail**: Use a [network security group](../../virtual-network/manage-network-security-group.md) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets.
53
53
54
54
When you use network security groups for network access control between subnets, you can put resources that belong to the same security zone or role in their own subnets.
55
55
56
56
**Best practice**: Avoid small virtual networks and subnets to ensure simplicity and flexibility.
57
57
**Detail**: Most organizations add more resources than initially planned, and re-allocating addresses is labor intensive. Using small subnets adds limited security value, and mapping a network security group to each subnet adds overhead. Define subnets broadly to ensure that you have flexibility for growth.
58
58
59
-
**Best practice**: Simplify network security group rule management by defining [Application Security Groups](https://azure.microsoft.com/blog/applicationsecuritygroups/).
59
+
**Best practice**: Simplify network security group rule management by defining [Application Security Groups](../..virtual-network/application-security-groups.md).
60
60
**Detail**: Define an Application Security Group for lists of IP addresses that you think might change in the future or be used across many network security groups. Be sure to name Application Security Groups clearly so others can understand their content and purpose.
61
61
62
62
## Adopt a Zero Trust approach
@@ -82,7 +82,7 @@ When you put a virtual machine on an Azure virtual network, the VM can connect t
82
82
83
83
Although the default system routes are useful for many deployment scenarios, there are times when you want to customize the routing configuration for your deployments. You can configure the next-hop address to reach specific destinations.
84
84
85
-
We recommend that you configure [user-defined routes](../../virtual-network/virtual-networks-udr-overview.md) when you deploy a security appliance for a virtual network. We talk about this in a later section titled [secure your critical Azure service resources to only your virtual networks](network-best-practices.md#secure-your-critical-azure-service-resources-to-only-your-virtual-networks).
85
+
We recommend that you configure [user-defined routes](../../virtual-network/virtual-networks-udr-overview.md#custom-routes) when you deploy a security appliance for a virtual network. We talk about this in a later section titled [secure your critical Azure service resources to only your virtual networks](network-best-practices.md#secure-your-critical-azure-service-resources-to-only-your-virtual-networks).
86
86
87
87
> [!NOTE]
88
88
> User-defined routes are not required, and the default system routes usually work.
@@ -183,7 +183,7 @@ Point-to-site VPN is more secure than direct RDP or SSH connections because the
183
183
**Option**: A [site-to-site VPN](../../vpn-gateway/vpn-gateway-howto-site-to-site-classic-portal.md) connects an entire network to another network over the internet. You can use a site-to-site VPN to connect your on-premises network to an Azure virtual network. Users on your on-premises network connect by using the RDP or SSH protocol over the site-to-site VPN connection. You don't have to allow direct RDP or SSH access over the internet.
184
184
185
185
**Scenario**: Use a dedicated WAN link to provide functionality similar to the site-to-site VPN.
186
-
**Option**: Use [ExpressRoute](../../expressroute/index.yml). It provides functionality similar to the site-to-site VPN. The main differences are:
186
+
**Option**: Use [ExpressRoute](../../expressroute/expressroute-introduction.md). It provides functionality similar to the site-to-site VPN. The main differences are:
187
187
188
188
- The dedicated WAN link doesn't traverse the internet.
189
189
- Dedicated WAN links are typically more stable and perform better.
0 commit comments