Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Control PaaS Network Communications with Network Security Perimeter

John Savill's Technical Training via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to implement and manage Network Security Perimeter (NSP) in Azure through this comprehensive technical walkthrough that demonstrates how to gain full control and visibility over Platform-as-a-Service (PaaS) network communications. Begin by understanding current network control limitations for VNet resources and PaaS services, then explore the challenges these limitations present in modern cloud environments. Discover how Network Security Perimeter addresses these challenges by providing centralized network security management for PaaS resources. Master the essential requirement of Managed Identity integration before diving into hands-on configuration of NSP components including profiles, supported resources, and rule management. Configure both inbound and outbound security rules to control traffic flow, then learn to manage profiles and resources after initial deployment. Explore different access modes and their implications for security posture, including learning mode for testing and enforced mode for production environments. Set up comprehensive logging and diagnostic settings to monitor network activity, then analyze access logs to understand traffic patterns and security events. Understand the relationship between Network Security Perimeter and existing Azure networking features like service endpoints and private endpoints. Conclude by learning how to automate NSP deployment and management using Azure Policy for consistent security governance across your organization.

Syllabus

00:00 - Introduction
00:08 - Current network controls for resources in a VNet
01:47 - Current network controls for PaaS resources
04:15 - Challenges today
04:59 - Network Security Perimeter overview
07:38 - MUST HAVE Managed Identity
09:27 - Configuring a NSP
10:13 - Profiles
12:20 - Supported resources
13:29 - Inbound rules
15:24 - Outbound rules
16:03 - Profiles and resources post creation
17:18 - Access mode
19:13 - Logs and diagnostic settings
21:43 - Viewing the access logs
22:49 - Enforced mode
24:13 - Service endpoints and private endpoints
24:55 - Secured by perimeter
26:34 - Configuring via Azure Policy
27:03 - Summary
27:53 - Close

Taught by

John Savill's Technical Training

Reviews

Start your review of Control PaaS Network Communications with Network Security Perimeter

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.