You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-applications/includes/8-design-solution-secure-access-applications.md
+23-15Lines changed: 23 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Azure WAF can be deployed with the following services:
12
12
13
13
-**Azure Application Gateway:** a layer 7 load balancer for regional traffic.
14
14
-**Azure Front Door:** a global content delivery and application acceleration service.
15
-
-**Azure Application Gateway for Containers:** an application gateway that manages traffic to containerized workloads. WAF support for Application Gateway for Containers uses the DRS 2.1 managed rule set only and has some feature limitations compared to Application Gateway WAF.
15
+
-**Azure Application Gateway for Containers:** an application gateway that manages traffic to containerized workloads. WAF support for Application Gateway for Containers uses the DRS 2.1 managed rule set only and has some feature limitations compared to WAF on Azure Application Gateway.
16
16
17
17
> [!NOTE]
18
18
> WAF on Azure Content Delivery Network (CDN) is no longer accepting new customers. Use WAF on Azure Front Door for new deployments requiring global edge protection.
@@ -39,52 +39,60 @@ WAF logs integrate with Azure Monitor and can be forwarded to Microsoft Sentinel
39
39
40
40
Azure Front Door is a global service that accelerates application delivery and provides global load balancing. WAF on Front Door inspects traffic at Azure edge locations before it reaches your origin servers, reducing latency for block decisions and protecting against geographically distributed attacks.
41
41
42
-
Key considerations for Front Door WAF vs. Application Gateway WAF:
42
+
Key considerations for WAF on Azure Front Door vs. WAF on Azure Application Gateway:
43
43
44
-
-**Global vs. regional.** Front Door WAF operates at the edge, providing protection close to the source of traffic. Application Gateway WAF operates regionally, in the Azure region where your application runs. For globally distributed applications, Front Door WAF provides lower-latency protection. For regional applications, Application Gateway WAF provides greater integration with virtual network architectures.
44
+
-**Global vs. regional.**WAF on Azure Front Door operates at the edge, providing protection close to the source of traffic. WAF on Azure Application Gateway operates regionally, in the Azure region where your application runs. For globally distributed applications, WAF on Azure Front Door provides lower-latency protection. For regional applications, WAF on Azure Application Gateway provides greater integration with virtual network architectures.
45
45
-**DDoS protection.** Azure Front Door includes built-in platform-level DDoS protection at network layers 3 and 4. Combined with WAF's layer 7 protection, this provides defense-in-depth against volumetric and application-layer attacks. For origin servers with public IPs, also enable Azure DDoS Protection to guard against attacks that bypass the edge.
46
-
-**Rate limiting.** Front Door WAF supports rate limiting rules that restrict the number of requests from a single source within a time window. This protects against brute force attacks and API abuse.
47
-
-**Geo-filtering.** Block or allow traffic from specific countries/regions. This reduces attack surface for applications that only serve specific geographic markets.
46
+
-**Rate limiting.** WAF on Azure Front Door supports rate limiting rules that restrict the number of requests from a single source within a time window, protecting against brute force attacks and API abuse.
48
47
49
48
> [!IMPORTANT]
50
49
> Managed rule sets are supported only on Azure Front Door Premium and Azure Front Door (classic). Front Door Standard supports custom rules only.
51
50
52
-
Front Door WAF policies combine custom rules and managed rule sets, processed in this order:
51
+
WAF on Azure Front Door policies combine custom rules and managed rule sets, processed in this order:
53
52
54
53
1.**Custom rules:** organization-specific allow or block logic, such as geo-filtering or IP restrictions. Custom rules act immediately on match — if a request matches a custom rule, no further rules are evaluated.
55
54
2.**Managed rule sets:** Azure-managed protection against common vulnerabilities, using the Default Rule Set (DRS). DRS versions 2.0 and later use **anomaly scoring**, where rule matches accumulate a severity-based score and the request is blocked only when the total exceeds a threshold. This reduces false positives for complex applications where a legitimate request might trigger a single low-severity rule. Earlier DRS versions (before 2.0) use per-rule blocking, where each rule match triggers immediate action.
56
55
57
56
Because custom rules are evaluated first, you can define organization-specific logic without disabling baseline protections in the managed rule sets. This layered approach lets you tailor protection to your application's requirements while maintaining the Azure-managed baseline.
58
57
58
+
## Comparing WAF across deployment options
59
+
60
+
All three deployment options share the same core WAF engine and inspect HTTP/HTTPS traffic against OWASP-based rule sets. The differences come down to where inspection happens, which rule sets are available, and what extra capabilities the hosting service adds.
61
+
62
+
-**WAF on Azure Application Gateway** inspects traffic regionally, inside your Azure virtual network. It supports the widest range of managed rule sets (CRS 3.x and DRS 2.x), rate-limit custom rules, bot protection, and per-site or per-URI policies. Choose Application Gateway when you need virtual network integration or when your application runs in a single region.
63
+
-**WAF on Azure Front Door** inspects traffic at global edge locations before it reaches your origin, providing lower-latency block decisions for distributed users. Managed rule sets and bot protection require the Premium tier; Standard supports custom rules only. Rate limiting is available on both tiers.
64
+
-**WAF on Application Gateway for Containers** targets containerized workloads managed through Kubernetes Gateway API. It supports DRS 2.1 and Bot Manager 1.0/1.1, but has feature limitations — no custom block responses, no X-Forwarded-For in custom rules, and no JavaScript/Captcha challenge actions for bot rules.
65
+
59
66
## Designing a WAF strategy
60
67
61
-
As an architect, consider these design decisions when incorporating WAF into your application security architecture:
68
+
As an architect, consider these decisions when incorporating WAF into your application security architecture:
62
69
63
70
### Choose the deployment model
64
71
65
72
| Scenario | Recommended WAF service |
66
73
|---|---|
67
-
| Single-region web applications behind a load balancer | Application Gateway WAF |
68
-
| Globally distributed web applications requiring edge acceleration | Front Door WAF |
69
-
| Applications requiring virtual network integration at the WAF layer | Application Gateway WAF (with virtual network integration) |
70
-
| Multi-region applications needing global failover and WAF | Front Door WAF with regional Application Gateways |
74
+
| Single-region web applications behind a load balancer | WAF on Azure Application Gateway |
75
+
| Globally distributed web applications requiring edge acceleration | WAF on Azure Front Door |
76
+
| Applications requiring virtual network integration at the WAF layer | WAF on Azure Application Gateway |
77
+
| Containerized workloads using Kubernetes Gateway API | WAF on Application Gateway for Containers |
78
+
| Multi-region applications needing global failover and WAF | WAF on Azure Front Door with regional Application Gateways |
71
79
72
-
For high-security architectures, you can chain Front Door WAF (for edge protection) with Application Gateway WAF (for regional, virtual network-integrated protection), applying defense in depth at both the global and regional layers.
80
+
For high-security architectures, chain WAF on Azure Front Door (edge protection) with WAF on Azure Application Gateway (regional, VNet-integrated protection) for defense in depth.
73
81
74
82
### Tune before enforcing
75
83
76
84
Deploy WAF in Detection mode first to understand traffic patterns and identify false positives. Analyze WAF logs to create exclusions for legitimate traffic that triggers rules incorrectly. Only switch to Prevention mode after you're confident that the policy doesn't block legitimate requests.
77
85
78
86
### Integrate with broader security monitoring
79
87
80
-
Forward WAF logs to Microsoft Sentinel for correlation with other security signals. A spike in blocked SQL injection attempts at the WAF layer may correlate with reconnaissance activity detected by Microsoft Defender for Cloud, providing context for incident response.
88
+
Forward WAF logs to Microsoft Sentinel for correlation with other security signals, providing context for incident response.
81
89
82
90
### Complement application-level security
83
91
84
-
WAF protects against known attack patterns but isn't a substitute for secure coding practices. Application-level input validation, parameterized queries, output encoding, and proper authentication remain essential. WAF provides defense in depth, catching threats that application-layer controls might miss.
92
+
WAF isn't a substitute for secure coding practices. Input validation, parameterized queries, output encoding, and proper authentication remain essential. WAF provides defense in depth, catching threats that application-layer controls might miss.
85
93
86
94
### Consider compliance requirements
87
95
88
-
Several regulatory frameworks require WAF or equivalent application-layer protection for internet-facing applications. Document your WAF deployment as a security control in compliance evidence for PCI-DSS, SOC 2, and other standards.
96
+
Several regulatory frameworks require WAF or equivalent application-layer protection for internet-facing applications. Document your WAF deployment as a security control in compliance evidence for PCI-DSS, SOC 2, and other frameworks.
0 commit comments