Skip to content

Commit 679f8db

Browse files
authored
changed files by pdets auto publish service, publishid[f98c010a-ef3f-4be4-a239-7f8260bc9564] and do [publish].
1 parent 978efc4 commit 679f8db

File tree

4 files changed

+17
-11
lines changed

4 files changed

+17
-11
lines changed

learn-pr/wwl-azure/implement-manage-enforcement-cloud-governance-policies/includes/5-azure-blueprints.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Blueprints are a declarative way to orchestrate the deployment of various resour
99

1010
The Azure Blueprints service is backed by the globally distributed [Azure Cosmos DB](/azure/cosmos-db/introduction). Blueprint objects are replicated to multiple Azure regions. This replication provides low latency, high availability, and consistent access to your blueprint objects, regardless of which region Azure Blueprints deploys your resources to.
1111

12-
## How it's different from ARM templates
12+
## How it's different from Azure Resource Manager templates
1313

1414
The service is designed to help with *environment setup*. This setup often consists of a set of resource groups, policies, role assignments, and Azure Resource Manager template deployments. A blueprint is a package to bring each of these *artifact* types together and allow you to compose and version that package, including through a continuous integration and continuous delivery (CI/CD) pipeline. Ultimately, each is assigned to a subscription in a single operation that can be audited and tracked.
1515

@@ -29,7 +29,7 @@ Including a policy in a blueprint enables the creation of the right pattern or d
2929

3030
A policy can be included as one of many *artifacts* in a blueprint definition. Blueprints also support using parameters with policies and initiatives.
3131

32-
## Bluepint Definition
32+
## Blueprint definition
3333

3434
A blueprint is composed of *artifacts*. Azure Blueprints currently supports the following resources as artifacts:
3535

learn-pr/wwl-azure/implement-manage-enforcement-cloud-governance-policies/includes/6-configure-azure-blueprints.md

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,17 @@
22

33
The foundational environment created by this blueprint sample is based on the architecture principals of a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke). The blueprint deploys a hub virtual network that contains common and shared resources, services, and artifacts such as Azure Bastion, gateway and firewall for connectivity, management and jump box subnets to host additional/optional management, maintenance, administration, and connectivity infrastructure. One or more spoke virtual networks are deployed to host application workloads such as web and database services. Spoke virtual networks are connected to the hub virtual network using Azure virtual network peering for seamless and secure connectivity. Additional spokes can be added by reassigning the sample blueprint or manually creating an Azure virtual network and peering it with the hub virtual network. All external connectivity to the spoke virtual network(s) and subnet(s) is configured to route through the hub virtual network and, via firewall, gateway, and management jump boxes.
44

5+
:::image type="content" source="../media/blueprint-sample-foundational-environment-10843ac1.png" alt-text="Diagram showing an example of a foundational environment created by a blueprint sample." lightbox="../media/blueprint-sample-foundational-environment-10843ac1.png" :::
6+
7+
58
This blueprint deploys several Azure services to provide a secure, monitored, enterprise-ready foundation. This environment is composed of:
69

710
- [Azure Monitor Logs](/azure/azure-monitor/logs/data-platform-logs) and an Azure storage account to ensure resource logs, activity logs, metrics, and networks traffic flows are stored in a central location for easy querying, analytics, archival, and alerting.
811
- [MIcrosoft Dedender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) (standard version) to provide threat protection for Azure resources.
912
- [Azure Virtual Network](/azure/virtual-network/virtual-networks-overview) in the hub supporting subnets for connectivity back to an on-premises network, an ingress and egress stack to/for Internet connectivity, and optional subnets for deployment of additional administrative or management services. Virtual Network in the spoke contains subnets for hosting application workloads. Additional subnets can be created after deployment as needed to support applicable scenarios.
1013
- [Azure Firewall](/azure/firewall/overview) to route all outbound internet traffic and to enable inbound internet traffic via jump box. (Default firewall rules block all internet inbound and outbound traffic and rules must be configured after deployment, as applicable.)
1114
- [Network security groups](/azure/virtual-network/network-security-group-how-it-works) (NSGs) assigned to all subnets (except service-owned subnets such as Azure Bastion, Gateway and Azure Firewall) configured to block all internet inbound and outbound traffic.
12-
- [Application security groups](/azure/virtual-network/application-security-groups) to enable grouping of Azure virtual machines to apply common network security policies.
15+
- [Application security groups](/azure/virtual-network/application-security-groups) to enable grouping of Azure Virtual Machines to apply common network security policies.
1316
- [Route tables](/azure/virtual-network/manage-route-table) to route all outbound internet traffic from subnets through the firewall. (Azure Firewall and NSG rules will need to be configured after deployment to open connectivity.)
1417
- [Azure Network Watcher](/azure/network-watcher/network-watcher-monitoring-overview) to monitor, diagnose, and view metrics of resources in the Azure virtual network.
1518
- [Azure DDoS Protection](/azure/ddos-protection/ddos-protection-overview) to protect Azure resources against DDoS attacks.
@@ -22,9 +25,9 @@ The Azure Security Benchmark Foundation lays out a foundational architecture for
2225

2326
To deploy the Azure Security Benchmark Foundation blueprint sample, the following steps must be taken:
2427

25-
- Create a new blueprint from the sample
26-
- Mark your copy of the sample as Published
27-
- Assign your copy of the blueprint to an existing subscription
28+
1. Create a new blueprint from the sample.
29+
2. Mark your copy of the sample as Published.
30+
3. Assign your copy of the blueprint to an existing subscription.
2831

2932
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free) before you begin.
3033

@@ -71,10 +74,12 @@ Once the copy of the blueprint sample has been successfully Published, it can be
7174
- Blueprint definition version: Pick a Published version of your copy of the blueprint sample.
7275
- Lock Assignment
7376

74-
Select the blueprint lock setting for your environment. For more information, see [blueprints resource locking](/azure/governance/blueprints/concepts/resource-locking).
77+
78+
- Select the blueprint lock setting for your environment. For more information, see [blueprints resource locking](/azure/governance/blueprints/concepts/resource-locking).
7579
- Managed Identity
7680

77-
Choose either the default *system assigned* managed identity option or the *user assigned* identity option.
81+
82+
- Choose either the default *system assigned* managed identity option or the *user assigned* identity option.
7883
- Blueprint parameters
7984

8085
The parameters defined in this section are used by many of the artifacts in the blueprint definition to provide consistency.
@@ -93,7 +98,8 @@ Once the copy of the blueprint sample has been successfully Published, it can be
9398
If Network Watcher is already enabled, it's recommended that you use the existing Network Watcher resource group. You must also provide the location for the existing Network Watcher resource group for the artifact parameter Network Watcher resource group location.
9499
- Artifact parameters
95100

96-
The parameters defined in this section apply to the artifact under which it's defined. These parameters are [dynamic parameters](/azure/governance/blueprints/concepts/parameters#dynamic-parameters) since they're defined during the assignment of the blueprint. For a full list or artifact parameters and their descriptions, see [Artifact parameters table](/azure/governance/blueprints/samples/azure-security-benchmark-foundation/deploy#artifact-parameters-table).
101+
102+
- The parameters defined in this section apply to the artifact under which it's defined. These parameters are [dynamic parameters](/azure/governance/blueprints/concepts/parameters#dynamic-parameters) since they're defined during the assignment of the blueprint. For a full list or artifact parameters and their descriptions, see [Artifact parameters table](/azure/governance/blueprints/samples/azure-security-benchmark-foundation/deploy#artifact-parameters-table).
97103
5. Once all parameters have been entered, select Assign at the bottom of the page. The blueprint assignment is created and artifact deployment begins. Deployment takes roughly an hour. To check on the status of deployment, open the blueprint assignment.
98104

99105
The Azure Blueprints service and the built-in blueprint samples are free of cost. Azure resources are [priced by product](https://azure.microsoft.com/pricing/). Use the [pricing calculator](https://azure.microsoft.com/pricing/calculator/) to estimate the cost of running resources deployed by this blueprint sample.
@@ -133,4 +139,4 @@ The table provides a list of the blueprint parameters:
133139

134140
## Troubleshooting
135141

136-
If you encounter the error The resource group 'NetworkWatcherRG' failed to deploy due to the following error: Invalid resource group location '\{location\}'. The Resource group already exists in location '\{location\}'., check that the blueprint parameter Network Watcher resource group name specifies the existing Network Watcher resource group name and that the artifact parameter Network Watcher resource group location specifies the existing Network Watcher resource group location.
142+
If you encounter the error the resource group 'NetworkWatcherRG' failed to deploy due to the following error: Invalid resource group location '\{location\}'. The Resource group already exists in location '\{location\}'., check that the blueprint parameter Network Watcher resource group name specifies the existing Network Watcher resource group name and that the artifact parameter Network Watcher resource group location specifies the existing Network Watcher resource group location.

learn-pr/wwl-azure/implement-manage-enforcement-cloud-governance-policies/includes/7-deploy-secure-infrastructures.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ We recommend using Azure landing zones when possible in your cloud adoption plan
4343
4444
Azure landing zones contain code that makes it easier for your organization's IT and security teams. Landing zones offer a repeatable, predictable method to apply a templatized implementation. That implementation includes a deployment approach, design principles, and design areas. Landing zones support security, management, and governance processes, as well as platform automation and DevOps.
4545

46-
:::image type="content" source="../media/azure-landing-zone-architecture-example-ce4b31c9-021827da.png" alt-text="Diagram showing an example of an Azure landing zone hierarchy for multiple tenants.":::
46+
:::image type="content" source="../media/azure-landing-zone-architecture-example-ce4b31c9-021827da.png" alt-text="Diagram showing an example of an Azure landing zone hierarchy for multiple tenants." lightbox="../media/azure-landing-zone-architecture-example-ce4b31c9-021827da.png" :::
4747

4848

4949
## Use Zero Trust principles
Loading

0 commit comments

Comments
 (0)