Our next-gen architecture is built to help you make sense of your ever-growing data. Watch a 4-min demo video!

Quick Start Security for Azure Express Route

Azure Express Route
Azure Express Route icon

Out-of-the-Box Security For Azure Express Route Includes:

Alerts - 4

Stay on top of Azure Express Route key performance metrics. Keep everyone in the know with integration with Slack, PagerDuty and more.

Network Layer Attacks on Azure ExpressRoute

In this scenario, threat actors launch network layer attacks against Azure ExpressRoute infrastructure, aiming to exploit vulnerabilities in network protocols, devices, or configurations. These attacks may include packet sniffing, spoofing, man-in-the-middle attacks, or other techniques designed to disrupt, intercept, or manipulate network traffic flowing through ExpressRoute circuits. Impact Data Interception: Network layer attacks can result in the interception of sensitive data transmitted over ExpressRoute connections, potentially exposing confidential information to unauthorized parties. Mitigation Traffic Encryption: Encrypt data transmitted over ExpressRoute circuits using protocols like IPSec or SSL/TLS to protect against packet sniffing, eavesdropping, and data interception by malicious actors. Mitre tactic:TA0005 Mitre technique:T1078

Compromised Endpoints in Azure ExpressRoute

In this scenario, one or more endpoints connected to an Azure ExpressRoute circuit become compromised due to various factors such as malware infection, unauthorized access, or software vulnerabilities. These compromised endpoints may include servers, virtual machines, IoT devices, or network appliances that are part of the ExpressRoute network. Impact Data Breach: Compromised endpoints may result in unauthorized access to sensitive data transmitted over the ExpressRoute connection Mitigation Endpoint Security Controls: Implement robust endpoint protection mechanisms such as antivirus software, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions to detect and mitigate malware infections, unauthorized access attempts, and suspicious activities. Mitre tactic:TA0005 Mitre technique:T1078

Denial of Service (Dos) Attack Detected on Azure ExpressRoute Gateway

This alert indicates that a Denial-of-Service (DoS) attack has been detected targeting the Azure ExpressRoute gateway. DoS attacks aim to disrupt the availability of services by overwhelming the target infrastructure with excessive traffic or resource exhaustion. Impact A successful DoS attack on the ExpressRoute gateway can degrade or disrupt connectivity between on-premises networks and Azure resources. It may result in service unavailability, performance degradation, or increased latency for legitimate traffic. Mitigation Activate DDoS Protection Standard for the ExpressRoute circuit to mitigate DoS attacks by automatically detecting and mitigating volumetric attacks. Configure rate limiting and traffic shaping policies on network devices to control and prioritize traffic flow. Mitre tactic:TA0005 Mitre technique:T1078

Unauthorized Access Detected on Azure ExpressRoute Circuit

This alert indicates that unauthorized access or suspicious activities have been detected on an Azure ExpressRoute circuit. It could involve unauthorized attempts to access data or resources transmitted through the circuit. Impact Unauthorized access to ExpressRoute circuits can lead to data breaches, data exfiltration, or service disruptions. It may compromise the confidentiality, integrity, and availability of sensitive information and resources. Mitigation Immediately investigate the alert to determine the extent of unauthorized access and potential impact. Disable or isolate the affected ExpressRoute circuit to prevent further unauthorized access. Review access controls, permissions, and authentication mechanisms for the ExpressRoute circuit and associated resources. Implement network security controls such as Network Security Groups (NSGs), firewalls, and intrusion detection/prevention systems (IDS/IPS) to monitor and filter traffic. Mitre tactic: TA0005 Mitre technique: T1078

Documentation

Learn more about Coralogix's out-of-the-box integration with Azure Express Route in our documentation.

Read More
Schedule Demo