Skip to content

Commit cd842d0

Browse files
committed
update
1 parent 3cd660a commit cd842d0

File tree

2 files changed

+4
-5
lines changed

2 files changed

+4
-5
lines changed

articles/security/fundamentals/isolation-choices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ Encryption in transit is a mechanism of protecting data when it's transmitted ac
211211

212212
#### Encryption at Rest
213213

214-
For many organizations, [data encryption at rest](isolation-choices.md) is a mandatory step towards data privacy, compliance, and data sovereignty. There are three Azure features that provide encryption of data that's "at rest":
214+
For many organizations, data encryption at rest is a mandatory step towards data privacy, compliance, and data sovereignty. There are three Azure features that provide encryption of data that's "at rest":
215215

216216
- [Storage Service Encryption](../../storage/blobs/security-recommendations.md) allows you to request that the storage service automatically encrypt data when writing it to Azure Storage.
217217
- [Client-side Encryption](../../storage/blobs/security-recommendations.md) also provides the feature of encryption at rest.

articles/security/fundamentals/network-best-practices.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,19 +80,17 @@ When you put a virtual machine on an Azure virtual network, the VM can connect t
8080

8181
Although the default system routes are useful for many deployment scenarios, there are times when you want to customize the routing configuration for your deployments. You can configure the next-hop address to reach specific destinations.
8282

83-
We recommend that you configure [user-defined routes](../../virtual-network/virtual-networks-udr-overview.md#custom-routes) when you deploy a security appliance for a virtual network. We talk about this recommendation in a later section titled [secure your critical Azure service resources to only your virtual networks](network-best-practices.md#secure-your-critical-azure-service-resources-to-only-your-virtual-networks).
83+
We recommend that you configure [user-defined routes](../../virtual-network/virtual-networks-udr-overview.md#custom-routes) when you deploy a security appliance for a virtual network. We talk about this recommendation in a later section titled [secure your critical Azure service resources to only your virtual networks](#secure-your-critical-azure-service-resources-to-only-your-virtual-networks).
8484

8585
> [!NOTE]
8686
> User-defined routes aren't required, and the default system routes usually work.
87-
>
88-
>
87+
8988

9089
## Use virtual network appliances
9190
Network security groups and user-defined routing can provide a certain measure of network security at the network and transport layers of the [OSI model](https://en.wikipedia.org/wiki/OSI_model). But in some situations, you want or need to enable security at high levels of the stack. In such situations, we recommend that you deploy virtual network security appliances provided by Azure partners.
9291

9392
Azure network security appliances can deliver better security than what network-level controls provide. Network security capabilities of virtual network security appliances include:
9493

95-
9694
* Firewalling
9795
* Intrusion detection/intrusion prevention
9896
* Vulnerability management
@@ -105,6 +103,7 @@ Azure network security appliances can deliver better security than what network-
105103
To find available Azure virtual network security appliances, go to the [Azure Marketplace](https://azure.microsoft.com/marketplace/) and search for "security" and "network security."
106104

107105
## Deploy perimeter networks for security zones
106+
108107
A [perimeter network](/azure/architecture/vdc/networking-virtual-datacenter) (also known as a DMZ) is a physical or logical network segment that provides an extra layer of security between your assets and the internet. Specialized network access control devices on the edge of a perimeter network allow only desired traffic into your virtual network.
109108

110109
Perimeter networks are useful because you can focus your network access control management, monitoring, logging, and reporting on the devices at the edge of your Azure virtual network. A perimeter network is where you typically enable [distributed denial of service (DDoS) protection](../../ddos-protection/ddos-protection-overview.md), intrusion detection/intrusion prevention systems (IDS/IPS), firewall rules and policies, web filtering, network antimalware, and more. The network security devices sit between the internet and your Azure virtual network and have an interface on both networks.

0 commit comments

Comments
 (0)