Introduction
The AZ-700 exam measures how well you can design and implement Azure networking solutions, and network security is one of the highest-value skills in that role. If you are building or defending Azure architecture, you are not just wiring up subnets and load balancers. You are deciding who can talk to what, over which paths, under what conditions, and with what visibility.
That matters because cloud network design is not only about connectivity. It includes traffic control, segmentation, inspection, encryption, and governance. In practice, that means choosing when to use NSGs, when to centralize inspection with Azure Firewall, when to remove public exposure with Private Link, and when to add DDoS Protection or WAF at the edge.
This guide focuses on practical design guidance you can use in real projects and on exam day. You will see how Azure-native tools fit together, where they overlap, and which patterns actually support least-privilege access, resilience, and compliance. If you are studying for AZ-700 or building toward a cybersecurity or Azure networking role, this is the material that separates memorized facts from working design judgment.
Understanding the Azure Network Security Landscape
Azure network security works in layers. Perimeter security protects the edge, internal segmentation limits lateral movement, and workload-level protection controls access to specific applications and services. In a strong design, these layers complement each other instead of duplicating the same control in multiple places.
Cloud security also follows the shared responsibility model. Microsoft secures the underlying cloud platform, but customers are responsible for network configuration, traffic rules, identity-based access, and the way services are exposed. Azure will provide the tools, but misconfiguration is still the customer’s problem. That distinction is crucial for cybersecurity design and for exam scenarios that test responsibility boundaries.
The core components you should know are Network Security Groups for subnet and NIC filtering, Application Security Groups for logical grouping, Azure Firewall for centralized stateful inspection, DDoS Protection for public endpoint resilience, and Private Link for private access to PaaS services. These are not interchangeable. Each solves a different security problem.
Identity, routing, and monitoring are part of the same design conversation. For example, even a perfect network rule set is weak if users can authenticate broadly, traffic can bypass inspection through a misrouted path, or no one is watching flow logs and firewall events. Network security in Azure is as much about governance and visibility as it is about blocking ports.
- Perimeter controls reduce exposure from the internet.
- Segmentation limits east-west movement between workloads.
- Workload controls define what an application can reach and accept.
- Logging and identity controls make the design auditable and enforceable.
Good Azure security design does not try to make everything private in one step. It creates controlled paths, then makes those paths observable and enforceable.
Designing Network Segmentation for Least Privilege
Segmentation is the practice of dividing network space so that workloads communicate only when they need to. In Azure, the most common patterns are hub-and-spoke, spoke-to-spoke with controlled routing, and environment-based separation for production, test, and development. The goal is simple: reduce blast radius and enforce least privilege at the network layer.
A hub-and-spoke design places shared services such as firewalls, DNS, or inspection tools in the hub, while application workloads live in spokes. This model works well when many workloads need a common security and routing backbone. Spoke-to-spoke traffic should usually be denied by default and allowed only through explicit routing and policy, often via a central firewall.
For application segmentation, separate subnets by tier. A web tier should not receive direct database access from the internet, and a management subnet should not be open to all internal traffic. Production, test, and development should also be separated. The mistake many teams make is putting non-production and production in the same address space and relying on names instead of rules. Names are helpful. Rules are enforceable.
Network Security Groups are the primary micro-segmentation tool. They can allow only port 443 from a specific source range, permit SSH from a jump host, or restrict database traffic to application subnets only. Use service tags where possible, because they reduce maintenance and keep rules aligned to Azure services instead of fixed IPs.
Warning
Flat networks create hidden risk. If every VM can talk to every other VM, lateral movement becomes easy and troubleshooting becomes harder because no one can tell which dependency is actually required.
- Use subnet boundaries for broad tier separation.
- Use NSGs for fine-grained rule enforcement.
- Use service tags for Microsoft-managed destinations.
- Use environment separation to avoid accidental production exposure.
A common segmentation mistake is overusing broad allow rules like “allow all within VNet.” That may feel convenient during deployment, but it weakens network security and makes later hardening painful. Start restrictive and add exceptions deliberately.
Implementing Network Security Groups and Application Security Groups
Network Security Groups filter traffic at the subnet and NIC level. They evaluate rules in priority order, and the first matching rule wins. That means rule placement matters just as much as rule content. If you put an overly broad allow rule above a specific deny or allow rule, the specific rule may never be used.
NSGs are effective because they support a deny-by-default model. Azure already includes default rules, but good designs do not assume those defaults are sufficient. Instead, define only the traffic needed for the workload, then explicitly document exceptions. This approach gives you stronger control over inbound and outbound traffic and makes audits easier.
Application Security Groups make rule management easier by grouping VMs logically. Instead of tracking individual IP addresses for every backend server, you assign those servers to an ASG and reference the ASG in the NSG rule. That reduces rule sprawl and keeps the policy tied to application roles, not machine identities.
For a three-tier app, you can place web servers in one ASG, app servers in another, and database servers in a third. Then you can allow web to app on port 443 and app to database on the SQL port, while blocking everything else. This is cleaner than writing dozens of IP-based rules that break whenever a VM scales or changes addresses.
Troubleshooting starts with effective security rules. In the Azure portal, you can inspect the effective NSG for a NIC or subnet. In practice, if traffic fails, check rule priority, source and destination scope, and whether another NSG at a different layer is blocking the flow. Validate with test tools such as Test-NetConnection from Windows or curl/nc from Linux.
Pro Tip
When a connection fails, document the intended flow first. Then verify source, destination, port, protocol, and route. Most NSG problems are not “Azure problems”; they are rule mismatch problems.
- Use NSGs for subnet and NIC enforcement.
- Use ASGs to reduce rule complexity.
- Prefer explicit allow rules over broad wildcard access.
- Test both inbound and outbound paths during validation.
Securing Traffic with Azure Firewall
Azure Firewall is a managed stateful firewall used for centralized inspection and policy enforcement. It is the right tool when you need consistent egress control, inter-spoke inspection, or layered internet breakout policies. NSGs remain important, but they are not a replacement for a firewall when you need centralized traffic control and logging.
The key difference is scope. NSGs are lightweight and distributed, which makes them great for local micro-segmentation. Azure Firewall gives you a central decision point for network rules, application rules, DNAT, and threat intelligence. If your requirement says “inspect all outbound web traffic” or “log all traffic crossing spokes,” Azure Firewall is usually the better answer.
Application rules are especially useful when you want to allow outbound access by FQDN rather than by IP. Network rules control L3/L4 traffic such as IP, port, and protocol. DNAT supports controlled inbound translation, while threat intelligence can alert or deny traffic to known malicious destinations. Logging gives security teams the evidence they need for investigations and compliance.
A common design is a hub-based firewall architecture. Spokes route to the hub, the firewall processes egress traffic, and optionally inspects inter-spoke traffic. This makes policy easier to govern because all major paths converge at one control point. The tradeoff is operational discipline: route tables must be correct, and rule collections should be organized clearly so the policy does not become a maintenance burden.
| NSG | Best for subnet or NIC-level allow/deny control with low overhead. |
| Azure Firewall | Best for centralized inspection, egress control, application filtering, and detailed logging. |
Keep rule collections simple. Group rules by business function, environment, or application family. Use policy inheritance if you manage multiple firewalls, but avoid burying critical exceptions in deep policy layers. Simplicity improves security because it makes drift easier to spot.
Protecting Applications with Azure DDoS Protection and Web Traffic Controls
Azure DDoS Protection Standard helps defend public endpoints against volumetric and protocol attacks. It is designed for internet-facing workloads that have real availability requirements, such as customer portals, APIs, or public application gateways. If downtime is costly, DDoS protection belongs in the design conversation early, not as an afterthought.
Protecting against DDoS is different from blocking malicious HTTP requests. A DDoS attack tries to overwhelm the service or network path. A web attack tries to exploit application behavior. That is where Azure Web Application Firewall comes in. WAF helps protect HTTP/S workloads from common web exploits such as SQL injection and cross-site scripting by inspecting request content and applying policy-based filtering.
Think of the pair this way: DDoS protects availability at scale, while WAF protects the application layer. One is not a substitute for the other. If you have a public app behind a load balancer or application gateway, you often want both, plus layered network controls underneath.
A strong edge design often combines load balancing, WAF, and DDoS protection. The exact placement depends on the workload, but the pattern is consistent: absorb attack volume at the edge, inspect HTTP/S traffic before it reaches the app, and keep backend subnets private wherever possible. This supports resilience and reduces the attack surface exposed to the internet.
Note
For exam scenarios, distinguish “traffic floods” from “web exploits.” The first points to DDoS Protection. The second points to WAF.
- Use DDoS Protection Standard for business-critical public endpoints.
- Use WAF for HTTP/S inspection and web attack filtering.
- Combine both when internet exposure and uptime matter.
- Keep backend services private even if the front door is public.
Using Private Access and Service Endpoints
Private Link and private endpoints are the cleanest way to remove public exposure from many Azure PaaS services. Instead of reaching Storage, SQL, or Key Vault over a public endpoint, workloads connect through a private IP address inside your virtual network. That significantly improves the security posture because traffic stays on private address space and is not exposed to the public internet.
Private access changes DNS design as well as routing. If DNS does not resolve the service name to the private endpoint, clients may still try the public path. That is why private DNS zones and careful name resolution are part of the design. Without DNS planning, private networking becomes a troubleshooting problem instead of a security win.
Service endpoints also extend VNet identity to PaaS services, but they work differently. They do not create a private IP for the service. Instead, they allow traffic from a VNet to reach the public service endpoint with network restrictions applied. That makes service endpoints easier to enable in some cases, but private endpoints usually provide a stronger security posture because the service is reachable privately.
Use private endpoints when the goal is to eliminate public reachability. Use service endpoints when you need simpler integration and the service design accepts public endpoint exposure with VNet-based controls. In multi-subscription or hybrid environments, standardize who can create private endpoints, who owns DNS, and how access approvals are governed. Otherwise, shadow connectivity can appear in places security teams do not expect.
- Private endpoints are best for reducing public exposure.
- Service endpoints are simpler but less restrictive.
- Private DNS is required for reliable name resolution.
- Govern access carefully across subscriptions and tenants.
Managing Egress Security and Controlling Outbound Traffic
Outbound traffic control is just as important as inbound filtering. Data exfiltration, malware callbacks, and unauthorized updates often happen through egress paths that teams forget to lock down. If every workload can browse the internet freely, your network security posture is incomplete.
Azure gives you several ways to centralize egress inspection. Forced tunneling and user-defined routes can send traffic from spokes to a hub, where Azure Firewall inspects and logs it. This pattern lets you control approved destinations, ports, and protocols from one place instead of relying on per-subnet exceptions. It also helps prevent accidental bypass of policy through direct internet access.
FQDN-based filtering is useful when destinations are better expressed as names than as IPs. Azure Firewall application rules can allow or deny based on domain, which simplifies policy for SaaS services and third-party APIs. Service tags also help, especially for Microsoft services whose IP ranges change over time. Threat intelligence adds another layer by identifying known bad destinations.
Logging and periodic review are not optional. Egress rules drift fast because application teams request exceptions, vendors change endpoints, and infrastructure expands. A monthly rule review can uncover broad allow rules, unused exceptions, or traffic that should be routed through a proxy or firewall. That kind of discipline matters in both operations and cybersecurity assessments.
Key Takeaway
If you cannot explain why a workload needs outbound access to a destination, you probably have not justified the rule well enough.
- Centralize outbound control wherever possible.
- Use FQDN rules for domain-based destinations.
- Use service tags for supported Microsoft services.
- Review outbound exceptions regularly to reduce exposure.
Monitoring, Logging, and Threat Detection
Monitoring is what turns network controls into a security program. Azure Monitor, Log Analytics, and diagnostic settings let you collect evidence from firewalls, NSGs, DDoS resources, and WAF components. Without logs, you cannot prove a rule worked, explain a blocked connection, or identify suspicious behavior quickly.
Firewall logs show permitted and denied traffic, threat intelligence matches, and policy decisions. NSG flow logs help you understand traffic patterns at the subnet and NIC level. DDoS metrics reveal traffic spikes and mitigation events. WAF logs show blocked requests and rule matches. Taken together, these sources give operations and security teams a shared view of what is happening on the network.
Look for suspicious patterns such as repeated connection attempts across many ports, traffic between workloads that should never talk, or outbound connections to unusual destinations. Port scanning often shows up as many denied attempts from one source. Lateral movement may appear as east-west traffic across subnets that were not supposed to communicate. Unusual outbound traffic can be a sign of compromise or misconfiguration.
Integration with Microsoft Sentinel or another SIEM makes correlation much stronger. A firewall deny, an identity anomaly, and an endpoint alert together tell a far more complete story than any one alert alone. Build alerts around useful thresholds, then create dashboards and runbooks so responders know what to check first. If the process is vague, the logs will still exist, but the response will be slow.
- Enable diagnostic logs on all major network security components.
- Correlate firewall, NSG, DDoS, and WAF data in one workspace.
- Define alerts for denied spikes, unusual egress, and policy hits.
- Maintain response runbooks for repeatable investigation.
Designing for Governance, Compliance, and Operational Excellence
Governance makes network security repeatable. Azure Policy can enforce baselines for NSGs, private endpoints, diagnostic settings, and firewall configurations. That matters because manual review does not scale well, especially when multiple teams deploy infrastructure. Policy keeps the platform aligned to standards even when humans make mistakes.
Tagging and naming conventions help operational teams understand what a resource is for, who owns it, and what environment it belongs to. At scale, a firewall rule without clear ownership becomes technical debt. A subnet name that encodes environment and workload is easier to support than a generic label that only the original author understands.
Role-based access control should follow least privilege. Not everyone who can view a network should be able to change security rules. Separate duties where possible. For example, one role may manage routing, another may approve firewall changes, and a third may review logs. This reduces the chance of accidental drift or unauthorized modification.
Compliance-friendly architectures are repeatable and auditable. If an auditor asks why a service is private, who approved the exception, or how logging is retained, you should be able to answer quickly. Governance controls such as required tags, policy-driven private endpoint deployment, and standardized logging reduce drift and make security consistency easier to prove. For teams building their skills through Vision Training Systems, this is the difference between deploying resources and operating a platform responsibly.
| Policy | Enforces rules automatically and reduces configuration drift. |
| RBAC | Limits who can change network security settings. |
Preparing for AZ-700 Exam Questions on Network Security
AZ-700 questions often present a scenario and ask you to choose the most appropriate control. Expect cases about segmentation, centralized inspection, private access, and edge protection. The exam is less about memorizing product names and more about matching the requirement to the right Azure service.
When reviewing a scenario, evaluate latency, scalability, cost, and administrative overhead. A simple subnet restriction is cheaper and faster than a full firewall path, but it may not satisfy centralized inspection requirements. A private endpoint may be more secure than a service endpoint, but it also requires DNS planning and operational ownership. Those tradeoffs matter in exam answers.
Watch for trap answers that choose a tool that is too complex or too weak for the requirement. If a question asks for centralized egress inspection, NSGs alone are not enough. If it asks to protect against application-layer attacks, DDoS Protection is not the right answer by itself. If it asks to reduce public exposure to PaaS services, Private Link is usually stronger than a basic public endpoint with IP restrictions.
You should know the differences between NSGs, Azure Firewall, DDoS Protection, WAF, Private Link, and service endpoints cold. A good study method is to draw architecture diagrams, build a lab, and read Microsoft documentation for each service. Hands-on practice helps you remember not just what the service does, but where it fits in the design.
- Map each control to its primary security purpose.
- Practice with real traffic flows in a lab.
- Review Microsoft docs for design limitations and dependencies.
- Test yourself with “which tool solves this requirement best?” scenarios.
Note
For AZ-700, the best answer is often the one that satisfies the requirement with the least operational complexity, not the one with the most features.
Conclusion
Strong Azure network security is layered, policy-driven, and tied directly to application requirements. NSGs and ASGs handle segmentation. Azure Firewall centralizes inspection and outbound control. DDoS Protection and WAF protect the edge. Private Link removes public exposure. Monitoring and governance make the whole design defensible in production and auditable in compliance reviews.
If you remember only one thing from this guide, remember this: choose the simplest control that fully meets the requirement, then add stronger controls where the risk justifies them. That is the kind of design thinking AZ-700 expects, and it is also the kind that works in real environments. It reduces attack surface, lowers drift, and makes troubleshooting more predictable.
Use this material to build diagrams, validate traffic flows, and practice rule design in a lab. If you want structured help preparing for AZ-700 or strengthening your Azure networking skills, Vision Training Systems can help you turn these concepts into repeatable, job-ready practice. Build the lab. Test the controls. Then test them again.