Introducing the Network Security Dashboard for Azure Security Center

%3CLINGO-SUB%20id%3D%22lingo-sub-2802774%22%20slang%3D%22en-US%22%3EIntroducing%20the%20Network%20Security%20Dashboard%20for%20Azure%20Security%20Center%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2802774%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22mpp-c-heading-3%22%3E%3CEM%3EWritten%20by%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Mohit%20Kumar's%20Tech%20Community%20profile%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F786329%22%20target%3D%22_blank%22%3EMohit%20Kumar%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Efor%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Azure%20Network%20Security%20blog%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-network-security%2Fbg-p%2FAzureNetworkSecurityBlog%22%20target%3D%22_blank%22%3EAzure%20Network%20Security%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eblog%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--328492116%22%20id%3D%22toc-hId--327424471%22%3E%3CSPAN%20class%3D%22mpp-c-heading-3%22%3EIntroduction%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3CBR%20%2F%3EMicrosoft%20Azure%20enables%20you%20to%20deploy%20a%20variety%20of%20infrastructure%2C%20web%20application%20and%20automation%20resources.%20These%20resources%20are%20generally%20a%20part%20of%20a%20larger%20infrastructure%20or%20an%20application%20service%20that%20your%20organization%20provides%20to%20its%20internal%20and%20external%20users.%20In%20addition%20to%20the%20networking%20endpoints%20of%20an%20overarching%20service%20that%20your%20users%20interact%20with%2C%20the%20different%20resources%20in%20an%20infrastructure%20or%20application%20service%20interact%20with%20each%20other%20through%20their%20own%20networking%20endpoints.%20These%20interactions%20depend%20on%20the%20underlying%20networking%20services%20provided%20by%20the%20Azure%20cloud%20to%20communicate%20with%20other%20tiers%20and%20with%20its%20users.%20This%20communication%20internally%20within%20Azure%20and%20to%20Azure%20from%20external%20networks%20is%20protected%20with%20resource%20specific%20ACLs%20and%20with%20the%20cloud%20native%20network%20security%20services%20such%20as%20DDoS%20Protection%2C%20Web%20Application%20Firewall%20(WAF)%2C%20Network%20Security%20Groups%20(NSG)%20and%20Firewall%20in%20Azure.%20With%20all%20network%20security%20controls%20in%20place%2C%20and%20each%20one%20implemented%20in%20a%20different%20dashboard%2C%20it%20becomes%20challenging%20for%20customers%20to%20have%20a%20single%20view%20of%20their%20entire%20Azure%20Network%20Security%20state%2C%20and%20that%20is%20what%20this%20workbook%20aims%20to%20solve.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--2135946579%22%20id%3D%22toc-hId--2134878934%22%3E%3CSPAN%20class%3D%22mpp-c-heading-3%22%3ECurrent%20Challenge%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3CBR%20%2F%3EAs%20your%20footprint%20in%20the%20Azure%20Cloud%20grows%2C%20the%20number%20of%20services%20and%20the%20infrastructure%2C%20application%20and%20automation%20resources%20involved%20in%20these%20services%20increases%20significantly%20which%20results%20in%20the%20number%20of%20endpoints%20which%20are%20exposed%20internally%20and%20externally%2C%20with%20or%20without%20the%20required%20security%20controls.%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EThis%20represents%20the%20attack%20surface%20of%20your%20organization%20which%20can%20be%20exploited%20by%20an%20attacker.%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3ETo%20appropriately%20secure%20your%20attack%20surface%2C%20you%20require%20better%20monitoring%20and%20governance%20of%20your%20resources%2C%20services%2C%20and%20their%20endpoints.%20The%20first%20step%20in%20this%20process%20is%20to%20inventory%20and%20gain%20visibility%20into%20the%20networking%20and%20security%20configuration%20your%20endpoints%20across%20your%20environment%2C%20along%20with%20the%20network%20security%20services%20they%20utilize%20or%20those%20which%20maybe%20inline.%20This%20helps%20you%20understand%20all%20the%20different%20paths%20an%20attacker%20can%20utilize%20to%20compromise%20your%20boundary%20and%20infiltrate%20into%20your%20environment%20plus%20the%20protections%20you%20already%20have%20against%20or%20those%20that%20need%20to%20put%20in%20place%20to%20prevent%20them.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-351566254%22%20id%3D%22toc-hId-352633899%22%3E%3CSPAN%20class%3D%22mpp-c-heading-3%22%3EProposed%20Solution%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3CBR%20%2F%3EUp%20until%20now%2C%20there%20was%20no%20single%20view%20with%20which%20you%20could%20visualize%20all%20your%20externally%20or%20internally%20exposed%20endpoints%2C%20their%20networking%20and%20security%20configuration%20or%20the%20network%20security%20services%20you%20had%20setup%20in%20Azure.%20You%20had%20to%20browse%20through%20many%20different%20blades%20in%20Azure%20to%20assess%20and%20obtain%20this%20information.%20With%20the%20availability%20of%20the%20new%20Network%20Security%20Dashboard%20for%20Security%20Center%2C%20you%20can%20now%20quickly%20get%20real%20time%20visibility%20of%20the%20security%20configuration%20of%20your%20networking%20and%20network%20security%20services%2C%20across%20multiple%20subscriptions%20in%20Azure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CSTRONG%3EThe%20Network%20Security%20Dashboard%20is%20free%20to%20use%20for%20all%20customers%20and%20does%20not%20require%20you%20to%20be%20a%20paid%20customer%20of%20Azure%20Security%20Center.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3E%3CA%20title%3D%22Introducing%20the%20Network%20Security%20Dashboard%20for%20Azure%20Security%20Center%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-network-security%2Fintroducing-the-network-security-dashboard-for-azure-security%2Fba-p%2F2779842%22%20target%3D%22_self%22%3E%3CSTRONG%3EREAD%20THE%20FULL%20ARTICLE%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Regular Contributor

Written by Mohit Kumar for the Azure Network Security blog

 

Introduction

 
Microsoft Azure enables you to deploy a variety of infrastructure, web application and automation resources. These resources are generally a part of a larger infrastructure or an application service that your organization provides to its internal and external users. In addition to the networking endpoints of an overarching service that your users interact with, the different resources in an infrastructure or application service interact with each other through their own networking endpoints. These interactions depend on the underlying networking services provided by the Azure cloud to communicate with other tiers and with its users. This communication internally within Azure and to Azure from external networks is protected with resource specific ACLs and with the cloud native network security services such as DDoS Protection, Web Application Firewall (WAF), Network Security Groups (NSG) and Firewall in Azure. With all network security controls in place, and each one implemented in a different dashboard, it becomes challenging for customers to have a single view of their entire Azure Network Security state, and that is what this workbook aims to solve.

 

Current Challenge

 
As your footprint in the Azure Cloud grows, the number of services and the infrastructure, application and automation resources involved in these services increases significantly which results in the number of endpoints which are exposed internally and externally, with or without the required security controls. This represents the attack surface of your organization which can be exploited by an attacker. To appropriately secure your attack surface, you require better monitoring and governance of your resources, services, and their endpoints. The first step in this process is to inventory and gain visibility into the networking and security configuration your endpoints across your environment, along with the network security services they utilize or those which maybe inline. This helps you understand all the different paths an attacker can utilize to compromise your boundary and infiltrate into your environment plus the protections you already have against or those that need to put in place to prevent them.

 

Proposed Solution

 
Up until now, there was no single view with which you could visualize all your externally or internally exposed endpoints, their networking and security configuration or the network security services you had setup in Azure. You had to browse through many different blades in Azure to assess and obtain this information. With the availability of the new Network Security Dashboard for Security Center, you can now quickly get real time visibility of the security configuration of your networking and network security services, across multiple subscriptions in Azure.

 

The Network Security Dashboard is free to use for all customers and does not require you to be a paid customer of Azure Security Center.

 

 

READ THE FULL ARTICLE

0 Replies