Chapter 6: Implementing Perimeter Security
The Azure cloud platform allows customers to create logically isolated private networks called virtual networks. These isolated networks are used to host IaaS and PaaS services, which require network isolation or traffic control measures managed by the customer. Securing these private networks from attacks and unauthorized access starts at the perimeter (the outer boundary between the untrusted public internet and your Azure virtual network resources).
In this chapter, we will look at what perimeter security looks like for Azure virtual networks, and how to use services and features of the platform to implement perimeter protection. Here are the topics that we will cover in this chapter, along with accompanying hands-on exercises:
- Securing the Azure virtual network perimeter
- Implementing Azure Distributed Denial of Service (DDoS) Protection
- Implementing Azure Firewall
- Implementing a Web Application Firewall (WAF) in...