Compliance alignment
This checklist is reviewed and maintained against three Microsoft architectural frameworks. Items within each section are tagged required, recommended, or optional based on framework guidance — with Zero Trust items typically driving the required bar, and Well-Architected pillar guidance informing the recommended set.
Naming follows the CAF pattern afw-{workload}-{env}-{region}-{index} for the firewall and pip-{workload}-{env}-{region}-{index} for each Public IP — naming is enforced at deployment time and cannot be changed post-deployment. The deployment is designed for hub VNet integration consistent with CAF landing zone connectivity subscriptions. Governance items address resource tagging (Workload, Environment, CostCenter, createdBy), CanNotDelete resource locks on the firewall resource group, and Azure Policy compliance for network security baselines. Note that the Azure Marketplace offer deploys through a managed template — customized naming must be applied via offer parameters before submission.
Reliability: Built-in high availability is included in the service — no additional load balancers are required. However, Basic SKU does not support availability zone deployment, limiting zone-level resiliency. Security: Centralized traffic inspection for both application-level (FQDN) and network-level (IP/port/protocol) rules; Threat Intelligence in Alert mode surfaces known-malicious traffic. Deny mode of Threat Intelligence requires Standard or Premium SKU. Performance Efficiency: Basic SKU supports up to 250 Mbps throughput — evaluate against peak workload requirements; scale-out requires SKU migration. Cost Optimization: ~$284/month base cost plus $0.065/GB; first Firewall Policy association is $0. Operational Excellence: Full IaC via Bicep with Marketplace offer deployment for repeatable, governed deployments.
Verify explicitly: All traffic to and from spoke subnets is inspected against Firewall Policy rule collections — no implicit trust based on source network. Application rules enforce FQDN allowlisting rather than broad IP ranges. Threat Intelligence in Alert mode provides visibility into connections to known malicious destinations. Least privilege: Firewall Contributor access to operations teams is time-bound through PIM; no standing Owner or Contributor on the firewall resource group. Assume breach: The firewall provides the only permitted egress path for protected subnets (enforced via UDR 0.0.0.0/0 → firewall private IP); spoke-to-spoke lateral movement can be controlled by sending inter-subnet traffic through the firewall as well. NSGs on spoke subnets remain essential — the firewall controls north-south traffic, not east-west intra-VNet movement.
References
Basic SKU & architecture
Networking & subnets
Firewall Policy
Monitoring & operations
View IaC on GitHub →