Category: Business, Security, firewall

As enterprise and government cloud migrations and attacks accelerate, IT teams in those organizations often come to the unpleasant realization that their security tools no longer have access to traffic in the public cloud — which they do not feel comfortable with at all. Without the ability to access the deepest and purest form of network data, i.e. packet data, security tools like an Intrusion Detection System (IDS), Intrusion Prevention System (IPS), or Network Detection and Response (NDR) are much less effective and protecting applications and sensitive data in the cloud from malicious actors becomes much more difficult.

The Network Operations (NetOps) teams within IT could not use their well-tried workflows in the cloud to provide adequate visibility to serve themselves and their application and security counterparts.

This post will cover how to create a monitoring subnet within Microsoft Azure that captures packet data and feeds it to downstream cloud native security tools.

The point of all of this is, of course, to get packets out of the cloud to a stack of security tools.

Related Articles