Skip to content

Network Security Basics

Azure network security is based on a zero-trust model, implementing multiple layers of defense to protect resources from unauthorized access.

Control Layer Scope Key Feature
NSG Layer 3/4 Subnet/NIC Stateful filtering.
Azure Firewall Layer 3/4/7 Regional FQDN filtering.
WAF Layer 7 Global/Regional OWASP protection.
DDoS Protection Layer 3/4 VNet / Public IP Mitigates attacks for protected resources.

mermaid graph TD Internet[Internet] --> Edge{Published entry point} Edge -->|HTTP/S| WAF[Application Gateway or WAF] Edge -->|TCP/UDP| LB[Public IP or Load Balancer] WAF --> Workload[Target resource] LB --> Workload NSG[Network Security Group] -. subnet or NIC filtering .-> Workload Workload --> Firewall[Azure Firewall for centralized egress and transit]

Note

NSG rules are processed in priority order (lowest number first). Once a match is found, no further rules are processed. Default rules are always at the end with the highest numbers.

Security Control Placement

Placement Primary Control Typical Outcome
Edge ingress DDoS + WAF Reduced attack surface
Network transit Azure Firewall Centralized policy enforcement
Workload subnet NSG Least-privilege east-west filtering

See Also

Sources