Microsoft AZ-700: Implement a Web Application Firewall on Azure Front Door

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 10: Implement a Web Application Firewall on Azure Front Door

Web Application Firewall (WAF) provides centralized protection of web apps from common exploits and vulnerabilities. SQL injection and Cross-site scripting are common.

Attack prevention is challenging. Can require lots of maintenance/patching/monitoring of many layers to the app. Centralized WAF aids in this. Also gives app admins better assurance to protection.

WAF can react to security threats faster by central patching instead of individual web app patching

  • Web Application Firewall Policy Modes
    • Two common modes
      • Detection
        • Default WAF policy mode
        • Doesn’t block requests but logs
      • Prevention
        • Matching requests blocked & logged
  • Web App. Firewall default rule set rule groups and rules
    • Azure Front Door WAF protects web apps from common vulns and exploits. Azure-managed rule sets provide easy deployment against common sec threats. Azure rule set updated as required to protect against new signatures
  • Managed Rules
    • Azure managed Default Rule Set includes common categories
      • Cross-site scripting
      • Java attacks
      • Local file inclusion
      • PHP injection attacks
      • Remote command execution
      • Remote file inclusion
      • Session fixation
      • SQL injection protection
      • Protocol attackers
    • Enabled by default
    • Disable individual rule by checkbox in front of rule and selecting Disable at top of page
    • Change action types by checkbox and select Change action at top of page
  • Custom Rules
    • WAF with Front Door allows access to web apps on defined conditions
    • Custom WAF rule consists of
      • Priority
      • Rule type
      • Match conditions
      • And action
    • Two types of customer rules
      • Match Rule
        • Determines access based on matching conditions
      • Rate Limit Rule
        • Access based on matching conditions and rates of inbound requests
    • When creating WAF policy, create custom rule selecting. Add Custom Rule under the Custom Rules section
  • Create a Web Application Firewall Policy on Azure Front Door
    • Key steps for basic WAF Policy and apply to Front Door
      • Create WAF policy
        • Create a basic WAF policy with managed Default Rule Set (DRS)
        • Associate WAF policy with Front Door profile
          • Done during WAF policy creation
          • Can also be done on previously created WAF policy
            • In association specify Front Door profile and domain to apply to
        • Configure WAF policy settings and rules
          • Optional step, can configure policy settings such as Mode (prevention/Detection and configure managed and custom rules
    • Detailed steps in MS Learn page Tutorial: Create a Web Application Firewall policy on Azure Front Door using the Azure portal
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-implement-a-web-application-firewall-on-azure-front-door/

Leave a Reply

Your email address will not be published.