Preparing the isolated network
In this section, we will focus on setting up the isolated network environment that will contain the resources for our penetration testing lab. We will establish a secure network environment setup in Microsoft Azure that restricts traffic from external hosts from reaching the cloud resources deployed inside the network environment:
Figure 5.7 – Isolated network environment
Of course, the resources deployed inside should be able to communicate with each other even if they are deployed in different VNets. We will accomplish this by setting up a VNet peering connection to bridge two virtual networks, similar to how a VPC peering connection bridges two Google Cloud VPCs, as we saw in the previous chapter.
Before we proceed with preparing the isolated network environment, let’s quickly go through some of the Azure concepts, features, and terminologies relevant to this chapter:
- Subscription: A logical unit...