Articles
Assume breach and minimize the impact with network security groups
In this blog post, I’ll explain how to restrict subnet traffic flow with network security groups and create fine-grained rules with service tags. Why it’s ...
Access internal applications with Entra Application Proxy
The way we work and the tools we use are changing rapidly. With more employees working remotely and using their own devices, the way organizations manage and...
Secure Azure PaaS services with Azure Private Link
When using Azure you shouldn’t take the security of your data and services for granted. Microsoft explicitly states that security is a shared responsibility ...
Centralize management with the hub-spoke network topology
OneFinance has many different applications that were brought to the cloud in unplanned way. During Corona OneFinance (like many other companies) ensured...
Zero Trust
Zero Trust is a security model based on the “Never trust, Always verify” principle. This means that all users, devices, and applications must be verified bef...