You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-applications/includes/8-design-solution-secure-access-applications.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,10 @@ Azure WAF can be deployed with the following services:
12
12
13
13
-**Azure Application Gateway:** a layer 7 load balancer for regional traffic.
14
14
-**Azure Front Door:** a global content delivery and application acceleration service.
15
-
-**Azure Application Gateway for Containers:** an application gateway that manages traffic to containerized workloads.
16
-
-**Azure Content Delivery Network (CDN):** Content Delivery Network from Azure.
15
+
-**Azure Application Gateway for Containers:** an application gateway that manages traffic to containerized workloads. WAF support for Application Gateway for Containers uses the DRS 2.1 managed rule set only and has some feature limitations compared to Application Gateway WAF.
16
+
17
+
> [!NOTE]
18
+
> WAF on Azure Content Delivery Network (CDN) is no longer accepting new customers. Use WAF on Azure Front Door for new deployments requiring global edge protection.
17
19
18
20
Each deployment option shares the same core WAF engine but offers service-specific capabilities that influence your architectural decisions.
19
21
@@ -40,15 +42,17 @@ Azure Front Door is a global service that accelerates application delivery and p
40
42
Key considerations for Front Door WAF vs. Application Gateway WAF:
41
43
42
44
-**Global vs. regional.** Front Door WAF operates at the edge, providing protection close to the source of traffic. Application Gateway WAF operates regionally, in the Azure region where your application runs. For globally distributed applications, Front Door WAF provides lower-latency protection. For regional applications, Application Gateway WAF provides greater integration with virtual network architectures.
43
-
-**DDoS protection.** Azure Front Door includes built-in DDoS layer 3 and 4 protection. Combined with WAF's layer 7 protection, this provides defense-in-depth against volumetric and application-layer attacks.
45
+
-**DDoS protection.** Azure Front Door includes built-in platform-level DDoS protection at network layers 3 and 4. Combined with WAF's layer 7 protection, this provides defense-in-depth against volumetric and application-layer attacks. For origin servers with public IPs, also enable Azure DDoS Protection to guard against attacks that bypass the edge.
44
46
-**Rate limiting.** Front Door WAF supports rate limiting rules that restrict the number of requests from a single source within a time window. This protects against brute force attacks and API abuse.
45
47
-**Geo-filtering.** Block or allow traffic from specific countries/regions. This reduces attack surface for applications that only serve specific geographic markets.
46
48
47
-
Front Door WAF policies combine custom rules and Azure-managed rule sets, processed in this order:
49
+
> [!IMPORTANT]
50
+
> Managed rule sets are supported only on Azure Front Door Premium and Azure Front Door (classic). Front Door Standard supports custom rules only.
51
+
52
+
Front Door WAF policies combine custom rules and managed rule sets, processed in this order:
48
53
49
-
1.**Custom rules:** organization-specific allow or block logic, such as geo-filtering or IP restrictions. Custom rules act immediately on match.
50
-
2.**Managed rule sets:** Azure-managed protection against common vulnerabilities, using the Default Rule Set (DRS). For managed rules, you choose between **anomaly scoring** (rule matches accumulate a score, and the request is blocked only when the total exceeds a threshold) or **per-rule blocking** (each rule match triggers immediate action). Anomaly scoring reduces false positives for complex applications where legitimate requests may trigger a single rule but not multiple rules. Per-rule blocking provides stricter enforcement but requires more tuning. Choose based on your organization's tolerance for false positives versus the sensitivity of the application.
51
-
3.**Default rules:** catch-all rules for traffic not matching other rules.
54
+
1.**Custom rules:** organization-specific allow or block logic, such as geo-filtering or IP restrictions. Custom rules act immediately on match — if a request matches a custom rule, no further rules are evaluated.
55
+
2.**Managed rule sets:** Azure-managed protection against common vulnerabilities, using the Default Rule Set (DRS). DRS versions 2.0 and later use **anomaly scoring**, where rule matches accumulate a severity-based score and the request is blocked only when the total exceeds a threshold. This reduces false positives for complex applications where a legitimate request might trigger a single low-severity rule. Earlier DRS versions (before 2.0) use per-rule blocking, where each rule match triggers immediate action.
52
56
53
57
Because custom rules are evaluated first, you can define organization-specific logic without disabling baseline protections in the managed rule sets. This layered approach lets you tailor protection to your application's requirements while maintaining the Azure-managed baseline.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-applications/includes/8a-map-technologies-application-security-requirements.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,7 @@ Application security requirements generally fall into these categories. For each
25
25
| Isolate APIs from public internet | API Management with virtual network integration (internal mode), private endpoints |
26
26
| Rate limit API calls to prevent abuse | Azure API Management policies, Azure Front Door rate limiting |
27
27
| Block traffic from unauthorized geographies | Azure WAF geo-filtering, Azure Front Door rules |
28
+
| Protect against volumetric and protocol DDoS attacks | Azure DDoS Protection (complements WAF layer 7 protection for origin IP addresses on virtual networks) |
28
29
29
30
### Data protection
30
31
@@ -40,7 +41,8 @@ Application security requirements generally fall into these categories. For each
40
41
| Requirement | Azure technologies |
41
42
|---|---|
42
43
| Static code analysis for vulnerabilities | GitHub CodeQL, Microsoft Security DevOps Extension for static application security testing (SAST) |
43
-
| Dynamic application testing in runtime | Dynamic application security testing (DAST) in staging environments, Microsoft Defender for Containers |
0 commit comments