Azure Kubernetes Service

Just Enough Azure for AKS

Azure network and security fundamentals

Azure delivers a comprehensive suite of networking and security services designed for hybrid and multi-cloud deployments. With native capabilities and integration options, you can secure traffic, isolate workloads, and extend protection across on-premises networks and third-party solutions.

The image displays various icons related to Azure Networking and Security, including cloud and shield symbols.

Many enterprises combine Azure’s built-in controls with partner offerings to achieve unified policy enforcement and advanced threat protection.

The image lists various third-party services related to Azure Networking and Security, featuring logos of companies like Cisco, Check Point, and Fortinet.

In this guide, we’ll explore:

  • Core Azure networking constructs
  • Strategies for privately securing PaaS services
  • Native load-balancing and traffic-distribution options

Virtual Networks and Subnets

An Azure Virtual Network (VNet) is your private IP-based network in Azure. It defines an address space you divide into subnets, isolating workloads and controlling traffic flow.

Key routing scopes:

  • Subnets within the same VNet
  • Peered VNets
  • On-premises networks (VPN or ExpressRoute)
  • The public internet

To enforce security at subnet or NIC level, attach a Network Security Group (NSG). NSGs evaluate rules in priority order to allow or deny traffic based on source/destination IP, port, and protocol. By default, an implicit “deny all” rule blocks any traffic not explicitly permitted.

Note

When designing NSG rules, remember that higher-priority (lower numeric) rules take precedence. Always review the default security rules to avoid unintended access.

The image is a diagram illustrating an Azure Virtual Network, showing a virtual network connected to a subnet with inbound and outbound rules, and linked to multiple Azure services.

If you have AWS experience, note that Azure subnets can span Availability Zones. A single VNet supports both private and public IP assignments, simplifying hybrid connectivity.


Securing PaaS Endpoints Privately

Azure’s multi-tenant PaaS services (Storage, SQL Database, Container Registry, etc.) use public endpoints by default. To restrict traffic to your private network, you have three main options:

  1. VNet Injection
    Deploy a dedicated instance inside your VNet. The service appliance gets a private IP from your address space.
    The image illustrates a virtual network with multiple IP addresses connected to a central network structure, labeled "vNet Injection."

  2. Service Endpoints
    Secure the service’s public endpoint to only accept requests from specified VNets/subnets, all over the Microsoft backbone.
    The image shows three Microsoft service endpoint icons: a binary file, a SQL database, and a cloud with a building structure, each labeled with "Microsoft."

  3. Private Link (Private Endpoint)
    Map a private IP in your VNet to a specific service instance. Traffic flows entirely over Azure’s private network.
    The image illustrates a "Private Link" concept, showing a connection between a user and a service through a private IP, secured by a lock symbol.

Warning

VNet Injection can incur higher costs and isn’t supported for every PaaS service. Evaluate your security requirements and budget before choosing.


Load Balancing Options

Azure offers four native services to distribute incoming traffic. Select based on OSI layer, geographic scope, and feature set.

ServiceLayerScopeUse Case
Azure Load BalancerLayer 4Regional*TCP/UDP distribution, standard and basic SKUs
Azure Application GatewayLayer 7RegionalHTTP(S) routing, cookie-based sessions, WAF support
Azure Front DoorLayer 7GlobalGlobal HTTP(S) failover, accelerated content delivery
Azure Traffic ManagerDNSGlobalGeo-routing, priority/failover based on endpoint health

*Global LB preview available in select regions.

Key considerations:

  • For Layer 4 (raw TCP/UDP), choose Azure Load Balancer.
  • For Layer 7 HTTP(S) with URL/path-based rules and Web Application Firewall (WAF), use Application Gateway or Front Door.
  • Use Traffic Manager for DNS-level routing, global geo-distribution, and health-check based failover.

Watch Video

Watch video content

Previous
Azure Storage Fundamentals