We would like to use third party cookies and scripts to improve the functionality of this website.
Approve Deny More info
Avatar

Brewed in the Cloud by Chris Hailes

Technolgy best served with a hot coffee or cold beer!

  1. Home
  2. About
  3. Archives
  4. Links
  5. Search
    1. Dark Mode

Archives

2025 61
2024 57
2023 2
2022 9
2021 1

Categories

Azure PaaS Networking Bicep Security Automation M365 Monitoring AVS DNS

Tags

Azure PaaS Networking Bicep Security Automation M365 Infrastructure as Code Monitoring AVS
Hub and Spoke Azure Firewall Application Gateway Web Application Firewall (WAF) Azure Monitor Microsoft Sentinel Traffic Analytics Azure Policy Cost Optimisation Zero Trust

Brewing a Secure Hub-and-Spoke in Azure - Operationalising the Secure Hub-and-Spoke

From theory to coffee on tap: running hub-and-spoke day to day”

Sep 18, 2025
3 minute read
Hub and Spoke Azure Application Gateway Zero Trust Azure Reference Architectures

Brewing a Secure Hub-and-Spoke in Azure - Azure Application Gateway

Application Gateway + WAF: No, it’s not “just another firewall”

Sep 16, 2025
7 minute read
Hub and Spoke Azure Firewall Virtual WAN Zero Trust Network Security Groups User Defined Routes Azure Reference Architectures

Brewing a Secure Hub-and-Spoke in Azure - Azure Firewall Premium

Azure Firewall Premium, your security barista on duty

Sep 11, 2025
7 minute read
Hub and Spoke Azure Firewall Virtual WAN Zero Trust Network Security Groups User Defined Routes Azure Reference Architectures

Brewing a Secure Hub-and-Spoke in Azure - Foundations

Foundations First: Why this network pattern still holds its crown

Sep 09, 2025
11 minute read
Azure Networking Security PaaS

Stirring in Services: Zero Trust for PaaS with Private Links

Applying Zero Trust to Azure PaaS — securing SQL, Storage, and Key Vault with Private Endpoints, DNS, and service isolation.

Sep 04, 2025
4 minute read
Azure Networking Security Identity

Identity is the New Perimeter: Conditional Access & Network Access

In Zero Trust networking for Azure, identity replaces the traditional perimeter. This post shows how Conditional Access, PIM, and JIT VM access plug directly into network security design.

Sep 02, 2025
5 minute read
Azure Networking Security Bicep

Least Privilege Pour: Using NSGs & AVNM Security Admin Rules

Scaling Zero Trust networking in Azure with NSGs for local segmentation and AVNM Security Admin Rules for global enforcement.

Aug 28, 2025
3 minute read
Azure Networking Bicep Security

Brewing the Basics: Zero Trust Networking in Azure

Because “trust but verify” is old hat. Now it’s “verify everything, every time.”

Aug 26, 2025
9 minute read
Azure Networking Bicep

NVAs & Dynamic Routing with Azure Route Server

BGP, meet Azure, dynamic routing without the migraine

Aug 21, 2025
4 minute read
Azure Networking Bicep

Next Hop, Please - Routing to Network Virtual Appliances (NVAs)

All roads lead to the NVA, if you route them right

Aug 19, 2025
5 minute read
1 2 … 13
© 2020 - 2025 Brewed in the Cloud by Chris Hailes
C & J Hailes Consulting
Creative Commons 4.0
Licensed under Creative Commons BY-NC-SA 4.0

Built with Hugo
Theme Stack designed by Jimmy