Slide 16
Slide 16 text
図の例
Description of figure 8: The image depicts a layered cybersecurity architecture designed to protect customer
services and Azure infrastructure with multiple defense layers. At the top, there's a symbol representing global
network or internet, connecting to the first layer labeled "Network Access." Below this are two more rows; the
second row is labeled "IDS/IPS," suggesting intrusion detection and prevention systems.
The third row is the "Cloud Access Layer," described by two sub-layers: "Host Firewall" on the left and "Distributed
Virtual Firewall" on the right. Underneath this row, there is a dotted border enclosing representations of two
firewall-protected areas. Each area has a brick firewall labeled with a fiery icon, with one marked "C" indicating
"Guest Firewall" and housing a symbol of a VM (virtual machine). The other, marked with number "2," suggests a
"Distributed Virtual Firewall" protecting another virtual machine labeled "Customer Cloud Service VMs."
On the left is a callout with the letter "B," colored in red, leading to a box that reads "DDoS Defense," which is
probably indicating a mechanism to protect against Distributed Denial-of-Service attacks.
Above the dotted box, there are indicators connecting the Host Firewall and Distributed Virtual Firewall with the
respective elements inside the dotted box: "1" leading to the Guest Firewall, and "2" to the Distributed Virtual
Firewall around the Customer Cloud Service VMs.
Copyright© 2024, @kosmosebi All Rights Reserved.
16