Azure Firewall - Detail Overview

Azure Firewall is a cloud-native and intelligent network firewall security service that provides the best of breed threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. It provides both east-west and north-south traffic inspection.

Azure Firewall Premium offers advanced security features that build upon the standard Azure Firewall capabilities, providing enhanced protection, particularly for highly sensitive and regulated environments. Here are the key features of Azure Firewall Premium along with examples to illustrate each feature:

1. TLS Inspection

  • TLS inspection, also known as SSL inspection, is a process where encrypted traffic is decrypted, inspected for threats or compliance, and then re-encrypted as it moves to its destination. This is crucial because, without TLS inspection, encrypted traffic would be a blind spot for security devices, allowing potentially malicious content to pass through unnoticed.  This allows Azure Firewall to inspect encrypted web traffic to prevent malware transmission and exfiltration.

EXAMPLE: Consider a scenario where an employee attempts to download a file from a seemingly reputable website while connected to the corporate network. Unknown to the employee, the file is infected with malware. With TLS inspection enabled on Azure Firewall, the encrypted traffic between the employee’s computer and the website is decrypted by the firewall. The firewall inspects the content, identifies the malware, blocks the file download, and alerts the security team. Without TLS inspection, the encrypted download would proceed unchecked, potentially compromising the network.

2. IDPS (Intrusion Detection and Prevention System)

  • Feature:

IDPS combines two major functionalities: intrusion detection, which monitors network and system activities for malicious actions or policy violations, and intrusion prevention, which actively blocks or prevents those detected threats from carrying out their intended actions. Essentially, IDPS acts as a watchdog and a gatekeeper, ensuring that only safe traffic is allowed through while keeping threats at bay.

In simple terms, Monitors network and system activities for malicious activities or policy violations. It can log information, attempt to block the intrusion, and report it.

  • Example: Suppose there's an attempt to exploit a known vulnerability in a web application hosted in Azure. The IDPS feature of Azure Firewall Premium can detect this attempt using known signatures or anomalies and take action to block the traffic, preventing the exploit from reaching the application.

3. Web Categories

  • Feature:
    Web Categories in Azure Firewall utilize a continuously updated database that classifies websites into categories based on their content. Administrators can create rules that allow or block access to these categories. This approach streamlines web access management and ensures that policies remain effective even as new websites emerge or existing sites change their content.


In simple terms, Allows administrators to allow or deny user access to website categories (such as social media, gambling, etc.), simplifying the management of web filtering rules.

  • Example: A school can configure Azure Firewall Premium to block access to gaming and adult content websites during school hours, ensuring students can only access educational content.

4. URL Filtering

  • URL Filtering in Azure Firewall involves specifying allow or deny rules for accessing specific URLs. Unlike Web Categories, which group websites into broad categories, URL Filtering targets individual web pages or domains. This allows for precise control over web access, ensuring that users can reach only the content that's deemed safe and relevant to their work.
  •  In simple terms , it Offers the ability to allow or deny access to specific URLs, not just entire domains, providing more granular control over web access.
  • Example: A company can allow access to "github.com" but restrict access to "github.com/malicious_repo", ensuring developers can access GitHub for legitimate work while blocking access to specific known malicious repositories.

5. FQDN Tags in Network Rules

  • Feature:
  • FQDN Tags are predefined identifiers in Azure Firewall rules that represent a group of domain names for specific Azure services, such as Azure Storage, Azure SQL, and Windows Update. When a network rule is created with an FQDN Tag, Azure Firewall automatically allows or denies traffic based on the domains associated with that tag, facilitating the configuration process and ensuring traffic to these services is correctly filtered without the need to specify each domain manually.
  • In simple terms , It Enables the use of fully qualified domain names (FQDNs) in network rule definitions, simplifying the creation of rules for well-known Azure services.
  • Example: An organization can easily create a network rule that allows Azure Backup without needing to know all the IP addresses associated with the Azure Backup service, by using the FQDN tag for Azure Backup.

6. Custom DNS

  • Feature:
  • Custom DNS in Azure Firewall enables the specification of one or more DNS servers that the firewall uses for resolving DNS queries instead of using the default DNS settings. This feature is particularly useful for integrating with on-premises DNS servers or third-party DNS services, allowing for seamless domain name resolution across cloud and on-premises environments or for enforcing specific DNS policies.

 

  • In simple terms, it Allows specifying custom DNS servers for domain name resolution, enabling Azure Firewall to use your own DNS.
  • Example: A company can configure Azure Firewall Premium to use their internal DNS servers for name resolution, ensuring that access to internal applications via their domain names is resolved correctly within their network.

7. DNS Proxy

  • Feature:
  • DNS Proxy in Azure Firewall serves as a DNS forwarder, intercepting DNS queries from virtual machines or other resources within Azure Virtual Networks (VNets) and forwarding them to the specified DNS server(s). This setup is particularly beneficial when using Custom DNS settings in Azure Firewall, as it ensures all DNS requests adhere to the organization's specified DNS resolution policies.
  • In simple terms, it Acts as a DNS server, forwarding DNS requests to the specified DNS server and caching the responses for efficiency.
  • Example: By acting as a DNS proxy, Azure Firewall Premium can efficiently manage DNS requests for a large enterprise, reducing latency and improving response time for DNS queries.

8. Transport Layer Security (TLS) 1.3 Support

  • Feature:

TLS 1.3 support in Azure Firewall ensures that the firewall can inspect, allow, and secure traffic encrypted using the latest TLS standard. With TLS 1.3, Azure Firewall can participate in the secure communication process by facilitating encrypted sessions between clients and servers. This is crucial for scenarios where deep packet inspection and filtering of encrypted traffic are required for security and compliance purposes.

  •  In simple terms, Supports the latest TLS 1.3 protocol for secure communication, providing improved security and performance.
  • Example: When an organization's services communicate with external APIs over HTTPS, Azure Firewall Premium ensures that these connections can leverage TLS 1.3, offering stronger encryption and faster handshake times.

  • Built-in High Availability: It comes with built-in high availability with no additional cost, eliminating the need for a complex HA setup and ensuring that your network security is always up and running.
  • Scalability: Azure Firewall can scale automatically with your network traffic, ensuring that your security measures scale with your Azure deployments.

 9.  Threat Intelligence: Integrated with Microsoft Threat Intelligence, it provides threat protection that can automatically identify and block known malicious traffic.

 

Concept

Threat intelligence in Azure Firewall is powered by Microsoft Threat Intelligence, a comprehensive database compiled from various sources, including Microsoft products and services, law enforcement agencies, and security partners.

This database includes information on IP addresses and domains associated with malware, phishing, botnets, and other cyber threats. By integrating this intelligence, Azure Firewall can proactively prevent communication with these known malicious entities, thereby adding an additional layer of security to protect Azure resources.

Example Scenario Consider a scenario where an employee accidentally clicks on a phishing link in an email that attempts to connect to a known malicious server. Azure Firewall, with its threat intelligence feature enabled, would inspect this outbound connection attempt. Recognizing the server's IP address in the Microsoft Threat Intelligence database, Azure Firewall would block the connection attempt, preventing the employee's device from communicating with the attacker's server. This action would be logged, and security administrators could review the attempt, further reinforcing the importance of ongoing security awareness training.

Conclusion

Azure Firewall's threat intelligence feature is a powerful tool for automatically identifying and blocking traffic to and from known malicious entities. By leveraging Microsoft's extensive threat intelligence data, Azure Firewall helps secure Azure environments against a wide range of cyber threats, reducing the risk of security breaches and enhancing overall network security.


Benefits of Using Azure Firewall

  • Enhanced Security: Protects your Azure resources from unauthorized access and attacks.

  • Simplified Management: Simplifies network security management through centralized policies and rules.
  • Compliance and Data Protection: Helps meet regulatory compliance requirements by providing advanced threat protection and data encryption capabilities.
  • Reduced Complexity: Eliminates the need to manage traditional hardware-based firewalls or deal with complex HA configurations.
  • Cost Efficiency: Offers a cost-effective solution with its pay-as-you-go pricing model, allowing you to pay only for what you use.

In summary, Azure Firewall plays a crucial role in securing Azure environments by providing robust network security, centralized management, and seamless integration with Azure services. Its absence would significantly increase the risk to your network, making it more susceptible to attacks and compliance issues.



Azure Landing Zone: Identity Subscription

 In an Azure enterprise landing zone, having a separate Identity subscription is a strategic approach to centralizing and securing identity management infrastructure and services. This separation aligns with best practices for organizational security, scalability, and management. Here’s why it’s necessary and what it entails:


Why We Need a Separate Identity Subscription

Centralized Identity Management:

Centralizing identity services in a dedicated subscription allows for better management and monitoring of critical identity resources such as Azure Active Directory (Azure AD), ensuring that identity and access management (IAM) policies are consistently applied across the entire organization.

Enhanced Security:

Identity and access control are fundamental to the security posture of any organization. A dedicated subscription for identity services enables focused security controls, auditing, and compliance efforts on these critical components, minimizing the risk of unauthorized access and breaches.

Isolation of Critical Resources:

Separating identity resources from operational and workload-specific subscriptions reduces the risk of accidental changes or deletions that could impact the entire organization. It also helps in isolating the identity management plane from potential breaches in other parts of the environment.

Scalability and Flexibility:

As organizations grow, their identity management needs evolve. A dedicated identity subscription allows for the scalability of identity services without impacting or being constrained by other operational aspects of the Azure environment.

Compliance and Regulatory Requirements:

Many industries have stringent regulations regarding data access and user authentication. A separate identity subscription simplifies compliance with these regulations by providing a clear boundary and control over identity-related resources and activities.


Resources to Deploy in the Identity Subscription

Azure Active Directory (Azure AD): The primary service for managing identities, user authentication, and authorization across Azure and integrated applications.

Azure AD Privileged Identity Management (PIM): Enhances security by managing, controlling, and monitoring access within Azure AD, including just-in-time privileged access.

Azure AD Identity Protection: Leverages artificial intelligence to detect vulnerabilities affecting an organization’s identities and provides automated responses to detected issues.

Conditional Access Policies: Define and enforce policies that react to specific conditions during authentication or access attempts, enhancing security.

Azure AD Connect: Synchronizes on-premises directories with Azure AD, facilitating hybrid identity scenarios.


Objectives Achieved with a Separate Identity Subscription

Robust Security Posture: By centralizing and isolating identity management, organizations can implement stronger security measures specifically tailored for protecting identity resources.

Compliance Assurance: Easier to demonstrate compliance with various regulatory standards by having a focused area for identity management that adheres to required controls and audits.

Operational Efficiency: Streamlines the management of identity services by segregating them from workload-specific resources, leading to improved operational clarity and efficiency.

Disaster Recovery Readiness: Facilitates the implementation of specific backup and recovery strategies for critical identity resources, ensuring business continuity in the face of disruptions.


In summary, a separate Identity subscription in an Azure enterprise landing zone provides a focused and secure environment for managing an organization’s identity and access management infrastructure. This strategic separation enhances security, compliance, and operational management, thereby supporting the overall integrity and resilience of the organization's cloud environment.


MS Defenders

 Microsoft Defender offers a wide range of security solutions, similar to the ones we've discussed (Defender for Containers, Defender fo...