Posts

Showing posts from September, 2022

Key features of Azure Firewall Standard

Source network address translation (SNAT): All outbound traffic is sent to the private IP address of the Azure Firewall instance. The IP address of each source virtual machine is translated to the static public IP address of the Azure Firewall instance. To all external destinations, your network traffic appears to come from a single public IP address. Destination network address translation (DNAT): All inbound traffic from external sources is sent to the public IP address of the Azure Firewall instance. Allowed traffic is translated to the private IP address of the destination resource on your virtual network. Application rules: Rules that limit outbound traffic to a list of FQDNs. For example, you can allow outbound traffic to access the FQDN of a specified SQL database instance. Network rules: Rules for incoming and outgoing traffic based on network parameters. These parameters include the destination or source IP address; the network port; and the network protocol. Threat intelligen...

Stateful & Stateless Firewall Differences

Image
 What is a Stateful Firewall? A stateful firewall examines the contents of data packets as well as the data's properties and communication routes. Stateful firewalls analyze the behavior of data packets and can filter out the suspect data if anything appears wrong. A stateful firewall may also monitor the activity of the data and record any patterns of behavior. Even if the suspicious activity was not deliberately entered by an administrator, the firewall can detect it and stop the danger if a data packet analysis shows it. An internal segmentation firewall (ISFW), which guards certain network segments in the event that malicious code gets inside, is an example of an internal stateful firewall that can be employed at the network's edge or inside. What is a Stateless Firewall? Stateless firewalls employ the source, destination, and other information in a data packet to determine if the data poses a threat. Administrators or manufacturers must input these parameters in accordance...

Azure Notes

1. Which of the aforementioned security efforts is supported by Azure Security Center? Azure Security Benchmark Custom initiatives Regulatory compliance standards 2. What conditions must be met before doing vulnerability assessments with Azure Defender for servers? The Log Analytics (Microsoft Monitoring) VM extension A Log Analytics workspace Azure Defender for servers 3.What may be done in accordance with the STRIDE framework to recognize and address possible security issues? Microsoft Threat Modeling Tool 4. What is a good reason to use the Azure CLI? It rarely changes, and the commands stay the same for the most part. The Azure CLI is all text based, so there is no user interface to change. This means the commands and procedures stay very static in the tool. You can use all products and services with the CLI. 5. Why would you use the Azure Cloud Shell? Cloud Shell enables access to a browser-based command-line experience built with Azure management tasks in mind. Cloud Shell is 100...

What is an HTTP flood attack

 An HTTP flood attack definition In a Distributed Denial of Service (DDoS) assault called an HTTP flood, a web server or application is targeted by an attacker who takes advantage of what appear to be valid HTTP GET or POST requests. A botnet "zombie army" is a collection of Internet-connected machines that have all been maliciously taken over, typically with the use of malware like Trojan Horses. HTTP flood attacks are volumetric attacks that frequently use this army. HTTP floods are a sophisticated Layer 7 attack that utilize less bandwidth than other attacks to take down the targeted server or website because they don't employ spoofing, reflection, or malformed packets. As a result, they necessitate a deeper comprehension of the targeted website or application, and each attack must be individually designed to be successful. Because of this, it is much more difficult to identify and prevent HTTP flood attacks. Attack Narrative:  An HTTP request, often one of the two typ...