Skip to content

Commit dbc1f31

Browse files
committed
fixes and tightening of content
1 parent d4c7989 commit dbc1f31

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/virtual-network/secure-virtual-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Data protection for Virtual Networks involves securing data in transit across yo
7878

7979
- **Enable encryption in transit**: Ensure all network traffic uses encryption protocols such as TLS 1.2 or higher, IPsec for VPN connections, and encrypted protocols for application communications. Azure provides encryption by default for traffic between Azure datacenters. For more information, see [Encryption in transit](/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit).
8080

81-
- **Use private endpoints for Azure services**: Deploy private endpoints to access Azure PaaS services over private IP addresses within your virtual network, eliminating exposure to the public internet and reducing data exfiltration risks. For more information, see [Private endpoints](/azure/private-link/private-endpoint-overview).
81+
- **Enable Azure Virtual Network encryption**: Use Azure Virtual Network encryption to encrypt data in transit between virtual machines within the same virtual network. This provides an additional layer of security for sensitive data. For more information, see [Azure Virtual Network encryption](/azure/virtual-network/virtual-network-encryption-overview).
8282

8383
- **Implement network access controls for sensitive data**: Use NSGs and Azure Firewall to restrict access to subnets and resources containing sensitive data. Apply defense-in-depth principles with multiple layers of network security controls.
8484

0 commit comments

Comments
 (0)