Skip to content

Commit be99377

Browse files
authored
Merge pull request #106973 from TerryLanfear/20mar09
fixes
2 parents 6bbb6a9 + 87500c6 commit be99377

File tree

2 files changed

+5
-7
lines changed

2 files changed

+5
-7
lines changed

articles/security/fundamentals/data-encryption-best-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides a set of best practices for data security and
44
services: security
55
documentationcenter: na
66
author: TerryLanfear
7-
manager: barbkess
7+
manager: rkarlin
88
editor: TomSh
99

1010
ms.assetid: 17ba67ad-e5cd-4a8f-b435-5218df753ca4
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 05/06/2019
17+
ms.date: 03/09/2020
1818
ms.author: terrylan
1919

2020
---
@@ -104,7 +104,7 @@ Following are best practices specific to using Azure VPN Gateway, SSL/TLS, and H
104104
**Detail**: Use [point-to-site VPN](/azure/vpn-gateway/vpn-gateway-point-to-site-create).
105105

106106
**Best practice**: Move larger data sets over a dedicated high-speed WAN link.
107-
**Detail**: Use [ExpressRoute](/azure/expressroute/expressroute-introduction). If you choose to use ExpressRoute, you can also encrypt the data at the application level by using [SSL/TLS](https://support.microsoft.com/kb/257591) or other protocols for added protection.
107+
**Detail**: Use [ExpressRoute](/azure/expressroute/expressroute-introduction). If you choose to use ExpressRoute, you can also encrypt the data at the application level by using SSL/TLS or other protocols for added protection.
108108

109109
**Best practice**: Interact with Azure Storage through the Azure portal.
110110
**Detail**: All transactions occur via HTTPS. You can also use [Storage REST API](https://msdn.microsoft.com/library/azure/dd179355.aspx) over HTTPS to interact with [Azure Storage](https://azure.microsoft.com/services/storage/).

articles/security/fundamentals/infrastructure-sql.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 06/28/2018
17+
ms.date: 03/09/2020
1818
ms.author: terrylan
1919

2020
---
@@ -72,7 +72,7 @@ The isolation of the root OS from the guest VMs and the guest VMs from one anoth
7272
### Types of rules on firewalls
7373
A rule is defined as:
7474

75-
{Security Response Center (Src) IP, Src Port, Destination IP, Destination Port, Destination Protocol, In/Out, Stateful/Stateless, Stateful Flow Timeout}.
75+
{Src IP, Src Port, Destination IP, Destination Port, Destination Protocol, In/Out, Stateful/Stateless, Stateful Flow Timeout}.
7676

7777
Synchronous idle character (SYN) packets are allowed in or out only if any one of the rules permits it. For TCP, Azure uses stateless rules where the principle is that it allows only all non-SYN packets into or out of the VM. The security premise is that any host stack is resilient of ignoring a non-SYN if it has not seen a SYN packet previously. The TCP protocol itself is stateful, and in combination with the stateless SYN-based rule achieves an overall behavior of a stateful implementation.
7878

@@ -101,5 +101,3 @@ To learn more about what Microsoft does to secure the Azure infrastructure, see:
101101
- [Azure infrastructure monitoring](infrastructure-monitoring.md)
102102
- [Azure infrastructure integrity](infrastructure-integrity.md)
103103
- [Azure customer data protection](protection-customer-data.md)
104-
105-

0 commit comments

Comments
 (0)