Chapter 6: Implementing Perimeter Security

The Azure cloud platform allows customers to create logically isolated private networks called virtual networks. These isolated networks are used to host IaaS and PaaS services, which require network isolation or traffic control measures managed by the customer. Securing these private networks from attacks and unauthorized access starts at the perimeter (the outer boundary between the untrusted public internet and your Azure virtual network resources).

In this chapter, we will look at what perimeter security looks like for Azure virtual networks, and how to use services and features of the platform to implement perimeter protection. Here are the topics that we will cover in this chapter, along with ...

Get Microsoft Azure Security Technologies Certification and Beyond now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.