Skip to content

Commit 89a50d5

Browse files
committed
fix for recent updates
1 parent f816910 commit 89a50d5

3 files changed

Lines changed: 18 additions & 11 deletions

File tree

learn-pr/wwl-sci/design-solutions-secure-applications/includes/10-summary.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ You've learned how to:
66
- Design and implement standards and practices for securing the application development process
77
- Design a solution for workload identity to authenticate and access Azure cloud resources
88
- Design a solution for API management and security
9-
- Design a solution for secure access to applications
9+
- Design solutions that secure applications by using Azure Web Application Firewall (WAF)
10+
- Map technologies to application security requirements
1011

1112
## Learn more
1213

learn-pr/wwl-sci/design-solutions-secure-applications/includes/8-design-solution-secure-access-applications.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,10 @@ Azure WAF can be deployed with the following services:
1212

1313
- **Azure Application Gateway:** a layer 7 load balancer for regional traffic.
1414
- **Azure Front Door:** a global content delivery and application acceleration service.
15-
- **Azure Application Gateway for Containers:** an application gateway that manages traffic to containerized workloads.
16-
- **Azure Content Delivery Network (CDN):** Content Delivery Network from Azure.
15+
- **Azure Application Gateway for Containers:** an application gateway that manages traffic to containerized workloads. WAF support for Application Gateway for Containers uses the DRS 2.1 managed rule set only and has some feature limitations compared to Application Gateway WAF.
16+
17+
> [!NOTE]
18+
> WAF on Azure Content Delivery Network (CDN) is no longer accepting new customers. Use WAF on Azure Front Door for new deployments requiring global edge protection.
1719
1820
Each deployment option shares the same core WAF engine but offers service-specific capabilities that influence your architectural decisions.
1921

@@ -40,15 +42,17 @@ Azure Front Door is a global service that accelerates application delivery and p
4042
Key considerations for Front Door WAF vs. Application Gateway WAF:
4143

4244
- **Global vs. regional.** Front Door WAF operates at the edge, providing protection close to the source of traffic. Application Gateway WAF operates regionally, in the Azure region where your application runs. For globally distributed applications, Front Door WAF provides lower-latency protection. For regional applications, Application Gateway WAF provides greater integration with virtual network architectures.
43-
- **DDoS protection.** Azure Front Door includes built-in DDoS layer 3 and 4 protection. Combined with WAF's layer 7 protection, this provides defense-in-depth against volumetric and application-layer attacks.
45+
- **DDoS protection.** Azure Front Door includes built-in platform-level DDoS protection at network layers 3 and 4. Combined with WAF's layer 7 protection, this provides defense-in-depth against volumetric and application-layer attacks. For origin servers with public IPs, also enable Azure DDoS Protection to guard against attacks that bypass the edge.
4446
- **Rate limiting.** Front Door WAF supports rate limiting rules that restrict the number of requests from a single source within a time window. This protects against brute force attacks and API abuse.
4547
- **Geo-filtering.** Block or allow traffic from specific countries/regions. This reduces attack surface for applications that only serve specific geographic markets.
4648

47-
Front Door WAF policies combine custom rules and Azure-managed rule sets, processed in this order:
49+
> [!IMPORTANT]
50+
> Managed rule sets are supported only on Azure Front Door Premium and Azure Front Door (classic). Front Door Standard supports custom rules only.
51+
52+
Front Door WAF policies combine custom rules and managed rule sets, processed in this order:
4853

49-
1. **Custom rules:** organization-specific allow or block logic, such as geo-filtering or IP restrictions. Custom rules act immediately on match.
50-
2. **Managed rule sets:** Azure-managed protection against common vulnerabilities, using the Default Rule Set (DRS). For managed rules, you choose between **anomaly scoring** (rule matches accumulate a score, and the request is blocked only when the total exceeds a threshold) or **per-rule blocking** (each rule match triggers immediate action). Anomaly scoring reduces false positives for complex applications where legitimate requests may trigger a single rule but not multiple rules. Per-rule blocking provides stricter enforcement but requires more tuning. Choose based on your organization's tolerance for false positives versus the sensitivity of the application.
51-
3. **Default rules:** catch-all rules for traffic not matching other rules.
54+
1. **Custom rules:** organization-specific allow or block logic, such as geo-filtering or IP restrictions. Custom rules act immediately on match — if a request matches a custom rule, no further rules are evaluated.
55+
2. **Managed rule sets:** Azure-managed protection against common vulnerabilities, using the Default Rule Set (DRS). DRS versions 2.0 and later use **anomaly scoring**, where rule matches accumulate a severity-based score and the request is blocked only when the total exceeds a threshold. This reduces false positives for complex applications where a legitimate request might trigger a single low-severity rule. Earlier DRS versions (before 2.0) use per-rule blocking, where each rule match triggers immediate action.
5256

5357
Because custom rules are evaluated first, you can define organization-specific logic without disabling baseline protections in the managed rule sets. This layered approach lets you tailor protection to your application's requirements while maintaining the Azure-managed baseline.
5458

learn-pr/wwl-sci/design-solutions-secure-applications/includes/8a-map-technologies-application-security-requirements.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ Application security requirements generally fall into these categories. For each
2525
| Isolate APIs from public internet | API Management with virtual network integration (internal mode), private endpoints |
2626
| Rate limit API calls to prevent abuse | Azure API Management policies, Azure Front Door rate limiting |
2727
| Block traffic from unauthorized geographies | Azure WAF geo-filtering, Azure Front Door rules |
28+
| Protect against volumetric and protocol DDoS attacks | Azure DDoS Protection (complements WAF layer 7 protection for origin IP addresses on virtual networks) |
2829

2930
### Data protection
3031

@@ -40,7 +41,8 @@ Application security requirements generally fall into these categories. For each
4041
| Requirement | Azure technologies |
4142
|---|---|
4243
| Static code analysis for vulnerabilities | GitHub CodeQL, Microsoft Security DevOps Extension for static application security testing (SAST) |
43-
| Dynamic application testing in runtime | Dynamic application security testing (DAST) in staging environments, Microsoft Defender for Containers |
44+
| Dynamic application testing | Dynamic application security testing (DAST) tools in staging environments |
45+
| Container runtime protection and vulnerability scanning | Microsoft Defender for Containers (runtime threat detection, image vulnerability assessment, supply chain protection) |
4446
| Software supply chain security | GitHub Dependabot, Azure Artifacts, software bill of materials (SBOM) generation |
4547
| Secret scanning and push protection | GitHub Advanced Security secret scanning |
4648
| Infrastructure-as-code security validation | Checkov, Terrascan, Template Analyzer via Security DevOps Extension |
@@ -50,7 +52,7 @@ Application security requirements generally fall into these categories. For each
5052

5153
| Requirement | Azure technologies |
5254
|---|---|
53-
| Application-layer threat detection | Microsoft Defender for App Service, Defender for Containers, Defender for APIs |
55+
| Application-layer threat detection | Microsoft Defender for App Service, Defender for Containers, Defender for APIs, Defender for Key Vault |
5456
| Security posture assessment and scoring | Microsoft Defender for Cloud with cloud security posture management (CSPM), Secure Score |
5557
| Attack path identification | Defender CSPM attack path analysis |
5658
| DevOps security monitoring | Azure DevOps Audit Streaming to Microsoft Sentinel |
@@ -88,7 +90,7 @@ An internal API platform serving other line-of-business applications focuses on
8890

8991
A Kubernetes-hosted microservices architecture requires supply chain and runtime security:
9092

91-
- Azure Container Registry with vulnerability scanning and quarantine
93+
- Azure Container Registry with vulnerability scanning and quarantine (preview)
9294
- Microsoft Defender for Containers for runtime protection
9395
- Workload identity federation for pod-to-Azure-resource authentication
9496
- Network policies for inter-service segmentation

0 commit comments

Comments
 (0)