Acknowledgments |
|
x | |
About the authors |
|
xi | |
Foreword |
|
xii | |
Introduction |
|
xiii | |
|
Chapter 1 Introduction to Azure Network Security |
|
|
1 | (16) |
|
|
1 | (8) |
|
Current threats and challenges |
|
|
9 | (3) |
|
|
12 | (3) |
|
Core security and firewall features |
|
|
13 | (2) |
|
|
15 | (2) |
|
Chapter 2 Secure Azure Network architectures |
|
|
17 | (18) |
|
|
17 | (5) |
|
|
22 | (11) |
|
|
23 | (1) |
|
|
24 | (4) |
|
|
28 | (1) |
|
|
29 | (4) |
|
|
33 | (2) |
|
Chapter 3 Controlling traffic with Azure Firewall |
|
|
35 | (26) |
|
The role of Azure Firewall in secure architecture |
|
|
36 | (9) |
|
Network segmentation for security |
|
|
36 | (1) |
|
|
37 | (1) |
|
Understanding Firewall components |
|
|
37 | (1) |
|
Getting traffic to Azure Firewall |
|
|
38 | (4) |
|
Integrating with other traffic management |
|
|
42 | (3) |
|
|
45 | (4) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (4) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (2) |
|
|
53 | (1) |
|
|
53 | (7) |
|
|
54 | (3) |
|
|
57 | (1) |
|
|
58 | (1) |
|
Third-party security services |
|
|
59 | (1) |
|
|
60 | (1) |
|
Chapter 4 Traffic Inspection in Azure Networks |
|
|
61 | (18) |
|
|
61 | (13) |
|
Deploying Azure Firewall Premium |
|
|
63 | (1) |
|
|
64 | (4) |
|
Intrusion detection and prevention |
|
|
68 | (2) |
|
Using full URLs for traffic management |
|
|
70 | (4) |
|
Network Watcher packet capture |
|
|
74 | (3) |
|
|
77 | (2) |
|
Chapter 5 Secure application delivery with Azure Web Application Firewall |
|
|
79 | (24) |
|
Integrating WAF into app defivepy architecture |
|
|
80 | (4) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
84 | (8) |
|
|
84 | (1) |
|
|
85 | (6) |
|
|
91 | (1) |
|
|
92 | (10) |
|
Policy deployment and tuning process |
|
|
92 | (1) |
|
|
93 | (4) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
Policy assignment for tuning |
|
|
101 | (1) |
|
|
102 | (1) |
|
Chapter 6 Mitigating DDoS attacks |
|
|
103 | (20) |
|
How Azure DDoS Protection Works |
|
|
103 | (5) |
|
|
104 | (2) |
|
DDoS Protection Basic versus Standard |
|
|
106 | (2) |
|
DDoS Protection Options for PaaS Services |
|
|
108 | (1) |
|
Enabling Azure DDoS Protection Standard |
|
|
108 | (4) |
|
Create a DDoS Protection plan |
|
|
109 | (1) |
|
Associate VNets to the DDoS Protection plan |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (9) |
|
|
112 | (3) |
|
Validation with BreakingPoint Cloud |
|
|
115 | (4) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (2) |
|
Chapter 7 Enabling Network Security log collection |
|
|
123 | (18) |
|
|
124 | (5) |
|
|
129 | (3) |
|
Azure DDoS Protection Standard |
|
|
132 | (2) |
|
|
134 | (2) |
|
|
136 | (3) |
|
Diagnostic settings at scale |
|
|
139 | (1) |
|
|
140 | (1) |
|
Chapter 8 Security monitoring with Azure Sentinel, Security Center, and Network Watcher |
|
|
141 | (24) |
|
|
141 | (7) |
|
|
142 | (2) |
|
Custom policy definitions |
|
|
144 | (3) |
|
|
147 | (1) |
|
|
148 | (13) |
|
Data connectors for network security |
|
|
149 | (1) |
|
Analytic rules and incidents |
|
|
150 | (3) |
|
|
153 | (1) |
|
|
153 | (3) |
|
|
156 | (3) |
|
|
159 | (2) |
|
|
161 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (2) |
|
Chapter 9 Combining Azure resources for a wholistic network security strategy |
|
|
165 | (16) |
|
Simple virtual network design |
|
|
165 | (2) |
|
Virtual network isolation |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (3) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
Integrating PaaS services |
|
|
169 | (1) |
|
Secure administrative access |
|
|
170 | (2) |
|
|
171 | (1) |
|
Role-based access control (RBAC) |
|
|
171 | (1) |
|
Application design scenarios |
|
|
172 | (4) |
|
Application Gateway behind Front Door |
|
|
173 | (2) |
|
Azure Kubernetes application |
|
|
175 | (1) |
|
|
176 | (1) |
|
Network Security Monitoring |
|
|
176 | (2) |
|
|
176 | (1) |
|
Cloud secure posture management |
|
|
177 | (1) |
|
|
178 | (3) |
Index |
|
181 | |