Zero Trust Enterprise Network (Azure Security Control Plane)

Zero Trust Enterprise Network (Azure Security Control Plane)

Identity-First Security Architecture with Azure Security Control Plane

Identity-First Security Architecture with Azure Security Control Plane

Description

This case study is an independent architecture design exercise developed to demonstrate Zero Trust enterprise security architecture methodology for hybrid cloud environments. It was not associated with a production deployment. The scenario is based on the security governance and access control requirements typical of medium-to-large enterprises operating hybrid infrastructure across Azure and on-premises environments.

This case study is an independent architecture design exercise developed to demonstrate Zero Trust enterprise security architecture methodology for hybrid cloud environments. It was not associated with a production deployment. The scenario is based on the security governance and access control requirements typical of medium-to-large enterprises operating hybrid infrastructure across Azure and on-premises environments.

Key Focus Areas:

  • Zero Trust Security Architecture

  • Identity & Privileged Access Governance

  • Network Segmentation & Traffic Control

  • SIEM & Security Operations Integration

  • Conditional Access Engineering

  • JIT & PIM Privileged Access

Executive Summary

Architected a Zero Trust enterprise security architecture on Microsoft Azure, integrating identity governance, privileged access management, centralised network control, workload protection, and security monitoring into a unified security control plane.

The architecture establishes an identity-first security model leveraging Microsoft Entra ID Conditional Access, Privileged Identity Management (PIM), Azure Firewall with hub-and-spoke network topology, NSG-based micro-segmentation, Just-in-Time VM access, and Microsoft Sentinel — reducing attack surface, eliminating standing privileged access, and strengthening enterprise-wide security governance across hybrid environments.

The design aligns with NIST SP 800-207 Zero Trust Architecture guidance and CIS Controls v8, demonstrating how identity-driven security architectures can function as centralised enterprise security control planes for modern hybrid cloud environments.

Business Drivers

Traditional perimeter-based security models treat the network boundary as the primary trust boundary — assuming that traffic inside the perimeter is implicitly trustworthy. Modern enterprise environments with cloud infrastructure, remote workforces, and SaaS platforms have rendered this model operationally obsolete and increasingly dangerous.

This architecture was designed to address the security governance requirements of organisations where legacy perimeter-based approaches result in:

  • Excessive standing administrative privileges creating persistent high-value attack targets for credential-based attacks

  • Weak identity governance controls failing to enforce consistent authentication strength and access policy across resources

  • Inconsistent network segmentation enabling lateral movement between workloads following initial compromise

  • Limited centralised monitoring visibility preventing detection of identity abuse, privilege escalation, and lateral movement

  • Poor auditability of privileged administrative activities creating compliance exposure and forensic gaps

  • Difficulty aligning operational security controls with compliance frameworks including NIST, CIS, and ISO 27001

  • Fragmented security operations across identity, network, and workload domains preventing correlated threat detection

Operational Constraints

The architecture was designed to operate within the following constraints typical of hybrid enterprise environments:

  • Administrative access workflows must preserve operational flexibility — JIT access models must not create excessive friction for legitimate administrative operations

  • Security controls require centralised governance without introducing architectural complexity that reduces operational manageability

  • Network segmentation must balance workload isolation against application connectivity requirements — over-segmentation creates operational disruption

  • Hybrid and distributed workloads require consistent policy enforcement regardless of workload location

  • Monitoring capabilities require centralised telemetry correlation across identity, network, and workload domains simultaneously

  • Access management processes must minimise disruption to operational teams during adoption

  • Security controls must support audit and compliance requirements with minimal manual reporting effort

Objectives

  • Enforce identity-first security across all enterprise resources — identity replaces network location as the primary trust boundary

  • Eliminate standing privileged administrative access through Just-in-Time elevation and time-bound role assignments

  • Implement centralised network traffic governance through a hub-and-spoke architecture with Azure Firewall as the inspection control plane

  • Enable workload micro-segmentation through NSG-based east-west traffic controls

  • Reduce lateral movement exposure through layered segmentation and workload isolation

  • Strengthen visibility across identity, network, and workload security domains through centralised SIEM integration

  • Align the platform with NIST SP 800-207 Zero Trust Architecture and CIS Controls v8

  • Deliver an audit-ready enterprise security architecture with comprehensive logging and governance traceability

Architecture Principles

  • Identity as the primary security perimeter — network location is not a trust signal

  • Least-privilege operational access enforced across all administrative and service account roles

  • Just-in-Time administrative elevation eliminating standing privilege exposure

  • Centralised traffic inspection and governance through a single firewall control plane

  • Layered segmentation combining macro-level network isolation and workload-level micro-segmentation

  • Continuous monitoring and telemetry correlation across all security domains

  • Defense-in-depth enforcement — no single control is relied upon exclusively

  • Policy-driven access control through Conditional Access and Azure Policy guardrails

  • Auditability and compliance by design — every privileged action and access decision is logged

Architecture Overview

The solution is structured as a four-layer Zero Trust security control plane integrating identity governance, network segmentation, workload protection, and centralised security monitoring.

1. Identity Governance Layer

The identity governance layer establishes identity as the primary enterprise security perimeter through Microsoft Entra ID Conditional Access policies and Privileged Identity Management.

Conditional Access Policy Design

Conditional Access policies enforce context-aware access decisions at every authentication event — replacing implicit network-based trust with explicit identity, device, and risk-based verification.

Policy Name

Conditions

Grant Controls

Require MFA — All Users

All cloud apps, all users

Require MFA

Block Legacy Authentication

Legacy auth protocols

Block access

Require Compliant Device — Privileged Access

Azure portal, admin consoles

Require Intune-compliant device

Location-Based Access Restriction

Outside named trusted locations

Require MFA + require compliant device

High-Risk Sign-In Response

Entra ID Identity Protection risk: High

Require MFA + require password change

Block Unmanaged Devices — Sensitive Apps

Sensitive workload applications

Require Hybrid Azure AD joined or compliant device

Conditional Access policies establish identity as the enforcement point for every access decision — regardless of whether the request originates from inside or outside the corporate network.

Privileged Identity Management (PIM)

PIM eliminates standing privileged role assignments — replacing permanent administrative access with Just-in-Time elevation workflows that activate privileges only when required and for defined durations.

  • Just-in-Time role activation requiring explicit request and business justification before privilege is granted

  • Approval workflows routing high-impact role activations through a designated approver before access is provided

  • Time-bound privilege assignments automatically expiring after defined activation windows (typically 1–4 hours)

  • Comprehensive privileged access audit trail capturing every activation request, approval decision, and role usage event

  • Eligible vs active role separation — administrators hold eligible assignments that require activation rather than permanent active assignments

PIM and JIT VM Access — Complementary Controls

PIM governs identity-layer privilege elevation — controlling who can activate Azure RBAC roles (e.g. Contributor, Security Admin) within the Azure management plane. JIT VM Access governs infrastructure-layer access — controlling when management ports (RDP, SSH) are exposed on specific virtual machines. Together they enforce privilege governance at both the identity and infrastructure layers: PIM ensures the right role is activated, JIT ensures the right port is opened, both for the minimum required duration.

2. Network Control Plane

The networking architecture is built on a hub-and-spoke topology with Azure Firewall as the centralised traffic inspection and governance control plane.

Hub-and-Spoke Network Topology

The hub VNet hosts centralised security services — Azure Firewall, management infrastructure, and jumpbox resources. Spoke VNets host workload subnets, connected to the hub through VNet peering with traffic routed through the central firewall.

Hub VNet — Subnet Architecture

Subnet

Purpose

Traffic Control

AzureFirewallSubnet

Azure Firewall deployment

Centralised ingress/egress inspection

ManagementSubnet

Administrative infrastructure

Restricted inbound — management only

JumpboxSubnet

Secure administrative access point

Inbound from management subnet only

Spoke VNet — Subnet Architecture

Subnet

Purpose

Traffic Control

WorkloadSubnet

Application workloads

East-west restricted via NSG

DataSubnet

Data tier workloads

Isolated — application subnet only

Azure Firewall

  • Centralised ingress and egress inspection for all hub-and-spoke traffic flows

  • Application rule collections enforcing FQDN-based outbound access control

  • Network rule collections enforcing IP and port-based traffic policies

  • IDPS (Intrusion Detection and Prevention System) for threat-aware traffic inspection

  • Centralised firewall policy management enabling consistent rule enforcement across the environment

  • Diagnostic logging to Log Analytics for traffic visibility and threat correlation

Network Security Groups

  • Subnet-level NSG rules enforcing east-west traffic restrictions between workload tiers

  • Deny-all default rules with explicit allow rules for required traffic flows only

  • JIT-compatible NSG rule model — management port rules dynamically added and removed by JIT VM Access workflows

  • NSG flow logs enabled for network traffic visibility and forensic investigation support

3. Workload Protection Layer

Workload protection capabilities are implemented through Microsoft Defender for Cloud and Just-in-Time VM Access controls.

Microsoft Defender for Cloud

  • Continuous security posture management across all Azure workloads through Secure Score monitoring

  • Vulnerability assessment identifying unpatched systems, misconfigured resources, and security recommendation gaps

  • Workload hardening guidance aligned to CIS benchmark recommendations for Azure VMs and PaaS services

  • Threat protection alerts for suspicious workload activity, anomalous process execution, and potential compromise indicators

  • Azure Policy integration enforcing security baseline configurations across workload deployments

Just-in-Time VM Access

  • Management ports (RDP port 3389, SSH port 22) blocked by default through NSG rules — no standing exposure of administrative access ports

  • JIT access requests require explicit user request, business justification, and defined access duration

  • Approved JIT requests dynamically open management ports for the requesting source IP only, for the approved duration only

  • Automatic port closure after access window expiry — no manual cleanup required

  • Complete JIT access audit trail capturing every request, approval, access event, and automatic closure

4. Monitoring & Detection Layer

Centralised monitoring and detection are implemented through Azure Monitor, Log Analytics, and Microsoft Sentinel — providing unified security visibility across identity, network, and workload domains.

Azure Monitor & Log Analytics

  • Centralised telemetry collection from all security-relevant sources: Entra ID sign-in and audit logs, Azure Firewall logs, NSG flow logs, Defender for Cloud alerts, VM activity logs

  • Log Analytics Workspace as the unified security data platform enabling cross-domain query and correlation

  • Azure Policy diagnostic setting enforcement ensuring all resources consistently forward logs to the central workspace

Microsoft Sentinel

  • SIEM platform ingesting centralised Log Analytics security telemetry for threat detection and incident correlation

  • Analytics rules detecting identity abuse patterns, privilege escalation, suspicious network traffic, and workload anomalies

  • Incident correlation connecting identity events, network alerts, and workload telemetry into unified investigation timelines

  • SOAR playbooks automating response actions — compromised account containment, anomalous IP blocking, SOC notification

  • Zero Trust coverage dashboard monitoring policy compliance, Conditional Access effectiveness, and PIM activation patterns

Azure Policy Governance

  • Policy assignments enforcing security baseline configurations across all deployed resources

  • Audit and deny policies preventing deployment of non-compliant resources outside defined security standards

  • Compliance dashboard providing continuous governance visibility and drift detection across the Azure environment

Architecture Diagram

Technologies Used


Category

Technologies

Identity & Governance

Microsoft Entra ID, Conditional Access, Privileged Identity Management (PIM)

Network Security

Azure Firewall, Azure Virtual Networks, Network Security Groups, Hub-and-Spoke Topology

Workload Protection

Microsoft Defender for Cloud, Just-in-Time VM Access

Governance Enforcement

Azure Policy

Monitoring & SIEM

Azure Monitor, Log Analytics Workspace, Microsoft Sentinel

Automation & Administration

PowerShell, Azure CLI

Compliance Frameworks

NIST SP 800-207 Zero Trust Architecture, CIS Controls v8, ISO 27001

Key Challenges Addressed

Eliminating standing privileged administrative access — addressed through PIM Just-in-Time role activation, replacing permanent active role assignments with time-bound eligible assignments requiring explicit activation, justification, and approval.

Standardising identity governance across environments — addressed through Conditional Access policies enforcing consistent MFA, device compliance, and risk-based authentication requirements across all cloud applications and administrative consoles.

Designing centralised network controls without operational bottlenecks — addressed through hub-and-spoke topology routing all traffic through Azure Firewall with application and network rule collections that enforce policy without requiring manual per-connection intervention.

Preventing lateral movement between workloads — addressed through subnet-level NSG deny-all defaults with explicit allow rules restricting east-west traffic to required application-tier communication flows only.

Balancing segmentation with application connectivity requirements — addressed through layered rule design combining Azure Firewall application rules for outbound governance and NSG rules for east-west control, allowing legitimate application traffic while blocking unrestricted lateral movement.

Integrating security telemetry across identity, network, and workload domains — addressed through centralised Log Analytics Workspace ingesting diagnostic logs from all security-relevant Azure services, providing a unified data platform for Sentinel-based correlation.

Delivering audit-ready governance controls — addressed through comprehensive PIM audit logging, Conditional Access sign-in logs, Azure Firewall diagnostic logs, NSG flow logs, and JIT access audit trails — all centralised in Log Analytics for consistent audit evidence collection.

Design Decisions & Rationale

PIM over Static RBAC Assignments : Permanent active RBAC role assignments create standing high-value targets — a compromised administrator credential provides immediate unrestricted access to its assigned scope. PIM eliminates this by making privilege elevation an explicit, time-bound, audited action rather than a permanent state. The operational cost — activating a role before performing administrative tasks — is a deliberate friction point that significantly reduces the blast radius of credential compromise.

Hub-and-Spoke Network Topology with Centralised Firewall : Flat network architectures without centralised traffic inspection allow unrestricted lateral movement following initial compromise. Hub-and-spoke topology forces all inter-spoke and external traffic through a central Azure Firewall inspection point — providing consistent traffic governance, centralised logging, and a single policy enforcement boundary across the network estate.

Layered Segmentation — Azure Firewall and NSGs : Azure Firewall and NSGs provide complementary but distinct segmentation capabilities. Azure Firewall governs north-south traffic (internet ingress/egress) and hub-to-spoke routing with application-layer awareness. NSGs enforce east-west micro-segmentation within spoke subnets at the workload level. Neither control alone provides the same depth — the combination enforces both macro-level network governance and workload-level isolation simultaneously.

Conditional Access as Primary Access Enforcement : Network location is no longer a reliable trust signal in hybrid and cloud environments. Conditional Access policies evaluate identity, device health, location, and sign-in risk at every authentication event — enforcing access decisions based on verified context rather than assumed network trust. This positions identity as the new security perimeter, consistent with NIST SP 800-207 Zero Trust principles.

JIT VM Access for Management Port Control : Permanently open RDP and SSH ports on internet-facing or network-accessible VMs represent a persistent attack surface that automated scanners and brute-force tools continuously probe. JIT VM Access eliminates standing port exposure — management ports are closed by default and opened only on-demand for approved source IPs for defined durations. The combination with PIM ensures both the identity-layer role and the infrastructure-layer port are governed through the same JIT access model.

Centralised SIEM Integration Through Sentinel : Security controls operating without centralised telemetry correlation produce isolated alerts that cannot be connected into coherent attack narratives. Sentinel ingests identity, network, and workload telemetry into a unified analytics platform — enabling detection of multi-stage attack chains that would be invisible to individual tool monitoring and providing the SOC visibility required for effective Zero Trust security operations.

Trade-offs & Design Constraints

PIM Activation Friction for Operational Teams : Just-in-Time role activation introduces deliberate friction into administrative workflows — administrators must request, justify, and wait for approval before performing privileged tasks. For organisations with high-frequency administrative operations, this friction can create operational pressure to bypass JIT workflows or configure excessively long activation windows that reduce the security benefit. Change management, clear operational procedures, and appropriately scoped activation windows are essential for successful PIM adoption.

Azure Firewall Cost at Enterprise Scale : Azure Firewall Premium with IDPS capability carries significant hourly cost independent of traffic volume. For organisations with high east-west traffic volumes between spokes, additional data processing costs accumulate. Cost-benefit analysis must weigh centralised inspection capability against traffic-based cost — organisations with predominantly internal east-west traffic patterns should evaluate whether NSG-only micro-segmentation is sufficient for some spoke-to-spoke flows.

Conditional Access Coverage Gaps for Legacy Applications : Conditional Access policies apply to applications integrated with Entra ID through modern authentication protocols. Legacy applications using NTLM, Kerberos, or basic authentication cannot be governed through Conditional Access. Blocking legacy authentication protocols — while essential for security — may break legacy application access for organisations that have not completed modern authentication migration. Legacy application inventory and modernisation planning must precede aggressive legacy authentication blocking.

NSG Rule Complexity at Scale : As workload complexity grows, NSG rule sets expand — creating management overhead and increasing the risk of misconfiguration or rule conflicts. In large environments, NSG rule management through Infrastructure as Code (Bicep, Terraform) and Azure Policy enforcement is essential to maintain rule consistency and prevent configuration drift over time.

Hub-and-Spoke Scalability for High-Throughput Workloads : Routing all inter-spoke traffic through the hub Azure Firewall introduces a potential throughput bottleneck for high-bandwidth workloads. Azure Firewall has defined throughput limits per SKU — Standard (30 Gbps) and Premium (100 Gbps). Organisations with high-throughput workload-to-workload communication should evaluate Azure Virtual WAN with Secured Virtual Hub as an alternative to single-hub-firewall topologies for better throughput scalability.

Projected Outcomes

The architecture is designed to deliver the following operational and security outcomes in a production enterprise environment:

  • Elimination of standing privileged administrative access through PIM Just-in-Time role activation across all administrative roles

  • Measurably reduced attack surface through JIT VM Access eliminating standing management port exposure

  • Improved lateral movement resistance through hub-and-spoke segmentation and NSG-based east-west traffic control

  • Centralised network traffic governance and inspection through Azure Firewall as the single enforcement control plane

  • Enhanced security visibility across identity, network, and workload domains through unified Sentinel-based monitoring

  • Improved threat detection and incident correlation capabilities through cross-domain telemetry aggregation

  • Alignment with NIST SP 800-207 Zero Trust Architecture and CIS Controls v8 compliance frameworks

  • Audit-ready enterprise security architecture with comprehensive logging across all privileged access and network traffic events

Future Evolution

  • User and Entity Behaviour Analytics (UEBA) integration for advanced insider threat and compromised account detection

  • Automated risk-based Conditional Access policies dynamically adjusting access requirements based on real-time Entra ID Identity Protection risk scores

  • Azure Virtual WAN migration for improved hub-and-spoke scalability and multi-region connectivity governance

  • Adaptive micro-segmentation through Azure Network Manager for centralised policy-driven NSG management at scale

  • Infrastructure as Code governance through Bicep and Azure Policy for consistent, auditable security control deployment

  • AI-assisted threat detection through Microsoft Security Copilot integration for accelerated incident investigation

  • Cross-cloud identity federation expansion extending Zero Trust governance to AWS and GCP workloads

  • Automated compliance reporting and drift detection through Azure Policy compliance dashboards and Defender for Cloud regulatory compliance views

Key Takeaways

  • Identity governance is the foundational layer of any Zero Trust architecture — network location cannot serve as a trust signal in hybrid and cloud environments

  • Eliminating standing privileges through PIM Just-in-Time elevation is one of the highest-impact security improvements available for enterprise environments — credential compromise without standing privilege has dramatically reduced blast radius

  • Layered segmentation combining centralised firewall governance and workload-level NSG micro-segmentation provides depth that neither control achieves independently

  • Conditional Access engineering requires careful policy design — overly aggressive policies break legitimate workflows, while gaps in policy coverage leave attack surface unaddressed

  • JIT VM Access and PIM are complementary controls governing different layers of the privilege stack — identity-layer elevation and infrastructure-layer port access should both be governed through JIT models

  • Centralised SIEM visibility is the operational prerequisite for Zero Trust security operations — controls without telemetry correlation cannot detect multi-stage attacks that traverse identity, network, and workload boundaries

  • Azure Policy governance guardrails are essential for maintaining Zero Trust security posture at scale — manual configuration governance degrades over time without automated policy enforcement

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.