💼 Management Samenvatting
Azure Networking architecture design implementeert hub-spoke topology met Virtual Networks (VNets), Netwerkbeveiliging Groups (NSG), Azure firewall, DDoS bescherming en privé endpoints (privé eindpunten) voor segmented, veilige en scalable network infrastructure volgens nul Trust network principles.
Network architecture is foundation voor: Segmentation (isolate workloads - compromised VM doesn't access everything), Traffic inspection (Azure firewall filters alle traffic), Private connectivity (no publieke endpoints - privé endpoints (privé eindpunten)), DDoS bescherming (mitigate attacks), Hub-spoke topology (centralized security - firewall in hub, workload VNets in spokes). Zonder proper network design: Flat network (no segmentation - lateral movement easy), publieke endpoints everywhere (aanvalsoppervlak), No traffic inspection (malware lateral spread), DDoS vulnerable.
Implementatie
Network architecture components: (1) Hub-Spoke topology: Hub VNet (centralized services: Azure firewall, VPN Gateway, Bastion), Spoke VNets (workload isolation: Production, Development, DMZ), VNet peering (hub-spoke connectivity); (2) Netwerkbeveiliging Groups (NSGs): Subnet-level firewallregels (Sta toe RDP alleen van bastion subnet), Application Security Groups (ASGs - group VMs door role); (3) Azure firewall: Central egress filtering (FQDN filtering, bedreigingsinformatie), Forced tunneling (all internet traffic via firewall); (4) privé endpoints (privé eindpunten): Azure services accessible via private IPs (opslag, SQL, Key Vault - no publieke endpoints); (5) DDoS bescherming Standard (Layer 3/4 bescherming, 100 Gbps capacity); (6) Bastion: veilige RDP/SSH (no public IPs op VMs).
Vereisten
- Network design document (IP adres planning)
- Hub VNet (Azure firewall, Bastion)
- Spoke VNets per workload
- NSG rules defined
- Azure firewallregels (allow/deny)
- privé endpoints (privé eindpunten) strategy
- DDoS bescherming Standard (if public IPs)
- Connectivity to on-premises (VPN/ExpressRoute if hybrid)
Implementatie
Design IP adres space, Maak aan hub VNet, implementeren Azure firewall, Maak aan spoke VNets, Configureer VNet peering, implementeren NSGs, Stel in privé endpoints (privé eindpunten), implementeren Bastion, Schakel in DDoS bescherming.
Compliance en Auditing
Network architecture voldoet aan: BIO 13.01 (Netwerkbeveiliging regelt - Segmentation mandatory), ISO 27001 A.13.1.1 (netwerkcontroles), CIS Azure Benchmark 6.x (Networking), NIS2 Artikel 21 (netwerk segmentatie).
Monitoring
Gebruik PowerShell-script azure-networking.ps1 (functie Invoke-Monitoring) – Controleren.
Remediatie
Gebruik PowerShell-script azure-networking.ps1 (functie Invoke-Remediation) – Herstellen.
Compliance & Frameworks
- CIS M365: Control 6.x (L1) - Netwerkbeveiliging
- BIO: 13.01.01 - netwerk segmentatie mandatory
- ISO 27001:2022: A.13.1.1 - netwerkcontroles
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
Risico zonder implementatie
Management Samenvatting
Azure Networking Architecture: Hub-spoke topology (centralized security), Azure Firewall (egress filtering + threat intelligence), NSGs ALL subnets (micro-segmentation), Private Endpoints PaaS (VNet-only SQL/Storage/Key Vault), Azure Bastion (secure RDP/SSH), DDoS Protection Standard (internet-facing), VPN Gateway/ExpressRoute (hybrid connectivity). Activatie: Network design → VNet deployment → Security controls. Kosten: Firewall €900+/maand, Bastion €140/maand. Verplicht BIO 13.01, CIS 6.x, Zero Trust. Implementatie: 80-120 uur. FOUNDATION secure Azure infrastructure - deploy BEFORE workloads.
- Implementatietijd: 120 uur
- FTE required: 0.5 FTE