Skip to content

Commit c6b8185

Browse files
committed
put my book in the index
1 parent e84ae8f commit c6b8185

File tree

4 files changed

+66
-17
lines changed

4 files changed

+66
-17
lines changed

docs/.obsidian/workspace.json

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,12 @@
1313
"state": {
1414
"type": "markdown",
1515
"state": {
16-
"file": "software-engineering/security/CISA.md",
16+
"file": "index.md",
1717
"mode": "source",
1818
"source": false
1919
},
2020
"icon": "lucide-file",
21-
"title": "CISA"
21+
"title": "index"
2222
}
2323
}
2424
]
@@ -80,21 +80,20 @@
8080
"state": {
8181
"type": "outline",
8282
"state": {
83-
"file": "software-engineering/security/CISA.md",
83+
"file": "index.md",
8484
"followCursor": false,
8585
"showSearch": false,
8686
"searchQuery": ""
8787
},
8888
"icon": "lucide-list",
89-
"title": "Outline of CISA"
89+
"title": "Outline of index"
9090
}
9191
}
92-
],
93-
"currentTab": 3
92+
]
9493
}
9594
],
9695
"direction": "horizontal",
97-
"width": 200
96+
"width": 258.5
9897
},
9998
"right": {
10099
"id": "e0b805506c2aec1c",
@@ -170,8 +169,9 @@
170169
},
171170
"active": "d04aa7fecda1a23c",
172171
"lastOpenFiles": [
173-
"img/firewall-infra.png",
172+
"software-engineering/Azure/AZ-500.md",
174173
"software-engineering/security/CISA.md",
174+
"img/firewall-infra.png",
175175
"img/firewall-infra.png.crdownload",
176176
"software-engineering/security/Fundamental-security-models.md",
177177
"[Security.md",
354 KB
Loading

docs/index.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,18 @@ Click on the menu on the top to explore the pages.
77
- [LinkedIn](https://www.linkedin.com/in/affinitoalessandro)
88
- [Soundcloud](https://soundcloud.com/alessandro-affinito-58528444)
99
- [YouTube](https://www.youtube.com/@alessandro-affinito/videos)
10-
10+
1111

1212
---
1313
# Support my work!
1414

1515
➡️ **[Buy me a coffee!](https://buymeacoffee.com/tuxerrante)**
16-
➡️ **[Sponsor me on GitHub!](https://github.com/sponsors/tuxerrante)**
16+
➡️ **[Sponsor me on GitHub!](https://github.com/sponsors/tuxerrante)**
17+
⬇️ [**Or read my book!**](https://www.amazon.it/Guida-pratica-Pensiero-Critico-Bussola/dp/B0F267MWNP)
1718

18-
I've been dedicated to creating free content for years, pouring countless hours into research, writing, and editing.
19-
Your support would mean the world to me and help me continue producing high-quality content. By sponsoring my work, you're not just helping me, but also validating the value of the information I provide.
19+
I've been dedicated to creating free content for years, pouring countless hours into research, writing, and editing.
20+
Your support would mean the world to me and help me continue producing high-quality content. By sponsoring my work, you're not just helping me, but also validating the value of the information I provide.
2021
Thank you for considering!
2122

22-
![[support.png]]
23+
[![[img/copertina_pensiero_critico_piccola.png]]](https://www.amazon.it/Guida-pratica-Pensiero-Critico-Bussola/dp/B0F267MWNP)
24+

docs/software-engineering/Azure/AZ-500.md

Lines changed: 51 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -493,6 +493,10 @@ When you create a route table and associate it to a subnet, the table's routes a
493493

494494
Dedicated physical connection to an Azure tenant
495495

496+
Dot1Q VLAN
497+
QinQ
498+
499+
496500
### VPN
497501

498502
IpSec/K encrypted connection.
@@ -524,28 +528,70 @@ L4 (TCP/UDP), REGIONAL
524528

525529
can be internal or external (get assigned a Public IP)
526530

527-
## APP GATEWAY
531+
## APPLICATION GATEWAY
528532

529533
L7, REGIONAL: redirection, rewrite, https,
530-
531534
Can have on top a WAF ([OWASP threats](https://learn.microsoft.com/en-gb/azure/web-application-firewall/ag/application-gateway-crs-rulegroups-rules?tabs=drs21#owasp-crs-32))
532535

536+
1. Connection comes from the internet
537+
2. App GW **frontend public IP** is reached trough the DNS
538+
3. **HTTP/HTTPS Listener**: The gateway listens for incoming HTTP or HTTPS traffic. This listener is configured to handle specific types of requests.
539+
4. **Rule**: Based on the listener's configuration, rules are applied to direct traffic. These rules determine how requests are routed to the backend.
540+
5. **Backend Pool**: The destination for the traffic. This pool can include:
541+
- **Virtual Machines (VMs)**: Individual virtual servers.
542+
- **Virtual Machine Scale Sets (VMSS)**: Groups of identical VMs that can automatically scale.
543+
- **App Services**: Managed services for hosting web applications.
544+
6. **Encryption**: The diagram highlights that traffic between the application servers and the application gateway is encrypted, ensuring secure communication.
545+
1. **AES-256 (Advanced Encryption Standard)**: This is a symmetric encryption algorithm widely used for its high level of security and efficiency.  
546+
2. **RSA-4096**: This is an asymmetric encryption algorithm used for secure data transmission. It uses a pair of keys (public and private) and is known for its robustness, especially with a 4096-bit key
547+
3. **TLS 1.3 (Transport Layer Security)**: This protocol provides secure communication over a computer network. TLS 1.3 is the latest version and offers improved security and performance over its predecessors 
548+
549+
A traditional load balancer directs traffic based on where it's coming from and where it's supposed to go, much like how a post office sorts mail based on the address on the envelope. However, Azure Application Gateway besides knowing where the traffic comes from and where it's going, it can also direct traffic based on what's being asked for in the request (APIs).
550+
- back end health check
551+
- autoscaling
552+
- session affinity
553+
- WAF
554+
533555
## AZ [FRONT DOOR](https://learn.microsoft.com/en-us/azure/frontdoor/front-door-overview)
534556

535557
L7,  GLOBAL
536558

537559
Uses [anycast](https://en.wikipedia.org/wiki/Anycast) to manage the connection as close as possible to the client ( the lowest number of [BGP](https://en.wikipedia.org/wiki/Border_gateway_protocol) network hops) with hundreds of PoPs (point of  presence) CDN connected through a high speed WAN.
538560

561+
**Key Features**:
562+
563+
1. **Global Load Balancing**: Routes traffic to the closest and healthiest backend based on latency, ensuring optimal performance for users worldwide 
564+
2. **Content Delivery Network (CDN)**: Provides caching and acceleration for static and dynamic content, reducing load times 
565+
3. **Web Application Firewall (WAF)**: Offers built-in protection against common web threats like SQL injection and cross-site scripting 
566+
4. **SSL Offloading**: Terminates SSL/TLS connections at the edge, reducing the load on backend servers 
567+
5. **Multi-Region Failover**: Ensures high availability by automatically routing traffic to another region if the primary region fails 
568+
539569
## NSG – Network Security Group (L4)
540570

541-
Allows us to groups network resources through tags instead of caring of IPs
571+
Allows us to group network resources through tags instead of caring of IPs.
542572

543-
SUBNET specifics
573+
SUBNET or NIC specific.
574+
575+
**Network Security Groups (NSGs)** can be applied to a single VM, subnet, or network adapter. **only one NSG** can be associated with each of these resources.
544576

545577
- Service endpoint: identifies an internal subnet to be allowed to call other internal services by allowing it in the target service firewall
546578
- Private endpoint: identifies a specific service instance inside a private subnet. Requires also a DNS configuration in order to be found by other internal services.
579+
- Through a resource manager deployment model they can be assigned at NIC level, such that the same VM would have different security rules assigned to its network interfaces.
580+
- Limit of 100 NSG per region. Max 200 rules per NSG. This limits can be increased by raising a support ticket.
581+
- https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview#default-security-rules
582+
583+
584+
## ASG - Application Security Group
585+
586+
https://learn.microsoft.com/en-us/azure/virtual-network/application-security-groups
587+
588+
It lets you focus on the business logic instead of networking details like IP addresses, allowing you to group virtual machines and define network security policies based on those groups (eg: AKS nodepool).
589+
All network interfaces assigned to an ASG should be in the same VNET.
547590

591+
## [Service Endpoints](https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview)
548592

593+
Virtual Network service endpoint provides secure and direct connectivity to Azure services over an optimized route over the Azure backbone network.
594+
Useful to identify internal resources that would have a non unique private IP while communicating through private VNets. Also it doesn't require a NAT Gateway.
549595

550596
-----
551597

@@ -663,6 +709,7 @@ flowchart TD
663709
* **Allocated dynamically** or statically from the VNet’s address space.
664710
* IPs are associated with NICs via Azure Resource Manager (ARM) configurations, not manually or directly by the admin.
665711
For load balancers, IPs are assigned to frontend configurations, not directly to the NIC.
712+
* Azure reserves the first four and last IPs in each subnet (e.g., .0, .1, .2, .3, and .255 in a /24).
666713

667714

668715
**🔎 Tip**: Private IPs are the default addressing method inside Azure VNets. Public IPs are required only for external communication.

0 commit comments

Comments
 (0)