You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/implement-manage-enforcement-cloud-governance-policies/includes/5-azure-blueprints.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ Blueprints are a declarative way to orchestrate the deployment of various resour
9
9
10
10
The Azure Blueprints service is backed by the globally distributed [Azure Cosmos DB](/azure/cosmos-db/introduction). Blueprint objects are replicated to multiple Azure regions. This replication provides low latency, high availability, and consistent access to your blueprint objects, regardless of which region Azure Blueprints deploys your resources to.
11
11
12
-
## How it's different from ARM templates
12
+
## How it's different from Azure Resource Manager templates
13
13
14
14
The service is designed to help with *environment setup*. This setup often consists of a set of resource groups, policies, role assignments, and Azure Resource Manager template deployments. A blueprint is a package to bring each of these *artifact* types together and allow you to compose and version that package, including through a continuous integration and continuous delivery (CI/CD) pipeline. Ultimately, each is assigned to a subscription in a single operation that can be audited and tracked.
15
15
@@ -29,7 +29,7 @@ Including a policy in a blueprint enables the creation of the right pattern or d
29
29
30
30
A policy can be included as one of many *artifacts* in a blueprint definition. Blueprints also support using parameters with policies and initiatives.
31
31
32
-
## Bluepint Definition
32
+
## Blueprint definition
33
33
34
34
A blueprint is composed of *artifacts*. Azure Blueprints currently supports the following resources as artifacts:
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/implement-manage-enforcement-cloud-governance-policies/includes/6-configure-azure-blueprints.md
+14-8Lines changed: 14 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,17 @@
2
2
3
3
The foundational environment created by this blueprint sample is based on the architecture principals of a [hub and spoke model](/azure/architecture/reference-architectures/hybrid-networking/hub-spoke). The blueprint deploys a hub virtual network that contains common and shared resources, services, and artifacts such as Azure Bastion, gateway and firewall for connectivity, management and jump box subnets to host additional/optional management, maintenance, administration, and connectivity infrastructure. One or more spoke virtual networks are deployed to host application workloads such as web and database services. Spoke virtual networks are connected to the hub virtual network using Azure virtual network peering for seamless and secure connectivity. Additional spokes can be added by reassigning the sample blueprint or manually creating an Azure virtual network and peering it with the hub virtual network. All external connectivity to the spoke virtual network(s) and subnet(s) is configured to route through the hub virtual network and, via firewall, gateway, and management jump boxes.
4
4
5
+
:::image type="content" source="../media/blueprint-sample-foundational-environment-10843ac1.png" alt-text="Diagram showing an example of a foundational environment created by a blueprint sample." lightbox="../media/blueprint-sample-foundational-environment-10843ac1.png" :::
6
+
7
+
5
8
This blueprint deploys several Azure services to provide a secure, monitored, enterprise-ready foundation. This environment is composed of:
6
9
7
10
-[Azure Monitor Logs](/azure/azure-monitor/logs/data-platform-logs) and an Azure storage account to ensure resource logs, activity logs, metrics, and networks traffic flows are stored in a central location for easy querying, analytics, archival, and alerting.
8
11
-[MIcrosoft Dedender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) (standard version) to provide threat protection for Azure resources.
9
12
-[Azure Virtual Network](/azure/virtual-network/virtual-networks-overview) in the hub supporting subnets for connectivity back to an on-premises network, an ingress and egress stack to/for Internet connectivity, and optional subnets for deployment of additional administrative or management services. Virtual Network in the spoke contains subnets for hosting application workloads. Additional subnets can be created after deployment as needed to support applicable scenarios.
10
13
-[Azure Firewall](/azure/firewall/overview) to route all outbound internet traffic and to enable inbound internet traffic via jump box. (Default firewall rules block all internet inbound and outbound traffic and rules must be configured after deployment, as applicable.)
11
14
-[Network security groups](/azure/virtual-network/network-security-group-how-it-works) (NSGs) assigned to all subnets (except service-owned subnets such as Azure Bastion, Gateway and Azure Firewall) configured to block all internet inbound and outbound traffic.
12
-
-[Application security groups](/azure/virtual-network/application-security-groups) to enable grouping of Azure virtual machines to apply common network security policies.
15
+
-[Application security groups](/azure/virtual-network/application-security-groups) to enable grouping of Azure Virtual Machines to apply common network security policies.
13
16
-[Route tables](/azure/virtual-network/manage-route-table) to route all outbound internet traffic from subnets through the firewall. (Azure Firewall and NSG rules will need to be configured after deployment to open connectivity.)
14
17
-[Azure Network Watcher](/azure/network-watcher/network-watcher-monitoring-overview) to monitor, diagnose, and view metrics of resources in the Azure virtual network.
15
18
-[Azure DDoS Protection](/azure/ddos-protection/ddos-protection-overview) to protect Azure resources against DDoS attacks.
@@ -22,9 +25,9 @@ The Azure Security Benchmark Foundation lays out a foundational architecture for
22
25
23
26
To deploy the Azure Security Benchmark Foundation blueprint sample, the following steps must be taken:
24
27
25
-
-Create a new blueprint from the sample
26
-
-Mark your copy of the sample as Published
27
-
-Assign your copy of the blueprint to an existing subscription
28
+
1.Create a new blueprint from the sample.
29
+
2.Mark your copy of the sample as Published.
30
+
3.Assign your copy of the blueprint to an existing subscription.
28
31
29
32
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free) before you begin.
30
33
@@ -71,10 +74,12 @@ Once the copy of the blueprint sample has been successfully Published, it can be
71
74
- Blueprint definition version: Pick a Published version of your copy of the blueprint sample.
72
75
- Lock Assignment
73
76
74
-
Select the blueprint lock setting for your environment. For more information, see [blueprints resource locking](/azure/governance/blueprints/concepts/resource-locking).
77
+
78
+
- Select the blueprint lock setting for your environment. For more information, see [blueprints resource locking](/azure/governance/blueprints/concepts/resource-locking).
75
79
- Managed Identity
76
80
77
-
Choose either the default *system assigned* managed identity option or the *user assigned* identity option.
81
+
82
+
- Choose either the default *system assigned* managed identity option or the *user assigned* identity option.
78
83
- Blueprint parameters
79
84
80
85
The parameters defined in this section are used by many of the artifacts in the blueprint definition to provide consistency.
@@ -93,7 +98,8 @@ Once the copy of the blueprint sample has been successfully Published, it can be
93
98
If Network Watcher is already enabled, it's recommended that you use the existing Network Watcher resource group. You must also provide the location for the existing Network Watcher resource group for the artifact parameter Network Watcher resource group location.
94
99
- Artifact parameters
95
100
96
-
The parameters defined in this section apply to the artifact under which it's defined. These parameters are [dynamic parameters](/azure/governance/blueprints/concepts/parameters#dynamic-parameters) since they're defined during the assignment of the blueprint. For a full list or artifact parameters and their descriptions, see [Artifact parameters table](/azure/governance/blueprints/samples/azure-security-benchmark-foundation/deploy#artifact-parameters-table).
101
+
102
+
- The parameters defined in this section apply to the artifact under which it's defined. These parameters are [dynamic parameters](/azure/governance/blueprints/concepts/parameters#dynamic-parameters) since they're defined during the assignment of the blueprint. For a full list or artifact parameters and their descriptions, see [Artifact parameters table](/azure/governance/blueprints/samples/azure-security-benchmark-foundation/deploy#artifact-parameters-table).
97
103
5. Once all parameters have been entered, select Assign at the bottom of the page. The blueprint assignment is created and artifact deployment begins. Deployment takes roughly an hour. To check on the status of deployment, open the blueprint assignment.
98
104
99
105
The Azure Blueprints service and the built-in blueprint samples are free of cost. Azure resources are [priced by product](https://azure.microsoft.com/pricing/). Use the [pricing calculator](https://azure.microsoft.com/pricing/calculator/) to estimate the cost of running resources deployed by this blueprint sample.
@@ -133,4 +139,4 @@ The table provides a list of the blueprint parameters:
133
139
134
140
## Troubleshooting
135
141
136
-
If you encounter the error The resource group 'NetworkWatcherRG' failed to deploy due to the following error: Invalid resource group location '\{location\}'. The Resource group already exists in location '\{location\}'., check that the blueprint parameter Network Watcher resource group name specifies the existing Network Watcher resource group name and that the artifact parameter Network Watcher resource group location specifies the existing Network Watcher resource group location.
142
+
If you encounter the error the resource group 'NetworkWatcherRG' failed to deploy due to the following error: Invalid resource group location '\{location\}'. The Resource group already exists in location '\{location\}'., check that the blueprint parameter Network Watcher resource group name specifies the existing Network Watcher resource group name and that the artifact parameter Network Watcher resource group location specifies the existing Network Watcher resource group location.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/implement-manage-enforcement-cloud-governance-policies/includes/7-deploy-secure-infrastructures.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ We recommend using Azure landing zones when possible in your cloud adoption plan
43
43
44
44
Azure landing zones contain code that makes it easier for your organization's IT and security teams. Landing zones offer a repeatable, predictable method to apply a templatized implementation. That implementation includes a deployment approach, design principles, and design areas. Landing zones support security, management, and governance processes, as well as platform automation and DevOps.
45
45
46
-
:::image type="content" source="../media/azure-landing-zone-architecture-example-ce4b31c9-021827da.png" alt-text="Diagram showing an example of an Azure landing zone hierarchy for multiple tenants.":::
46
+
:::image type="content" source="../media/azure-landing-zone-architecture-example-ce4b31c9-021827da.png" alt-text="Diagram showing an example of an Azure landing zone hierarchy for multiple tenants." lightbox="../media/azure-landing-zone-architecture-example-ce4b31c9-021827da.png" :::
0 commit comments