Skip to content

Commit

Permalink
Quality updates for WAF #2570 (#3079)
Browse files Browse the repository at this point in the history
  • Loading branch information
BernieWhite authored Oct 4, 2024
1 parent d2ed0be commit 61e0cf4
Show file tree
Hide file tree
Showing 8 changed files with 21 additions and 19 deletions.
10 changes: 6 additions & 4 deletions docs/en/rules/Azure.AKS.HttpAppRouting.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
---
reviewed: 2021/12/10
reviewed: 2021-12-10
severity: Important
pillar: Security
category: Application endpoints
category: SE:06 Network controls
resource: Azure Kubernetes Service
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AKS.HttpAppRouting/
---
Expand All @@ -21,11 +21,13 @@ This may be helpful in some limited scenarios, but should not be used in product
When exposing application endpoints consider using an ingress controller that supports:

- Security filtering behind web application firewall (WAF).
- Encyption in transit over TLS.
- Encryption in transit over TLS.
- Multiple replicas.

Azure provides a production ready ingress controller _Application Gateway Ingress Controller_ (AGIC).

HTTP application routing add-on (preview) for Azure Kubernetes Service (AKS) will be retired on 03 March 2025.

## RECOMMENDATION

Consider disabling the HTTP application routing add-on in your AKS cluster.
Expand Down Expand Up @@ -182,7 +184,7 @@ resource cluster 'Microsoft.ContainerService/managedClusters@2021-07-01' = {

## LINKS

- [Best practices for endpoint security on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-endpoints)
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
- [HTTP application routing](https://learn.microsoft.com/azure/aks/http-application-routing)
- [Enable Application Gateway Ingress Controller add-on for an existing AKS cluster](https://learn.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-existing)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.containerservice/managedclusters#ManagedClusterAutoUpgradeProfile)
4 changes: 2 additions & 2 deletions docs/en/rules/Azure.AppGw.UseWAF.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
reviewed: 2021-07-25
severity: Critical
pillar: Security
category: Application endpoints
category: SE:06 Network controls
resource: Application Gateway
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AppGw.UseWAF/
---
Expand Down Expand Up @@ -101,7 +101,7 @@ $AppGw = Set-AzApplicationGatewaySku -ApplicationGateway $AppGw -Name 'WAF_v2' -

## LINKS

- [Best practices for endpoint security on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-endpoints)
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
- [Securing PaaS deployments](https://learn.microsoft.com/azure/security/fundamentals/paas-deployments#install-a-web-application-firewall)
- [What is Azure Web Application Firewall on Azure Application Gateway?](https://learn.microsoft.com/azure/web-application-firewall/ag/ag-overview)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.network/applicationgateways)
4 changes: 2 additions & 2 deletions docs/en/rules/Azure.AppGw.WAFEnabled.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
severity: Critical
pillar: Security
category: Network security and containment
category: SE:06 Network controls
resource: Application Gateway
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.AppGw.WAFEnabled/
---
Expand Down Expand Up @@ -102,7 +102,7 @@ Set-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway

## LINKS

- [Best practices for endpoint security on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-endpoints)
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
- [Securing PaaS deployments](https://learn.microsoft.com/azure/security/fundamentals/paas-deployments#install-a-web-application-firewall)
- [What is Azure Web Application Firewall on Azure Application Gateway?](https://learn.microsoft.com/azure/web-application-firewall/ag/ag-overview)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.network/applicationgateways)
2 changes: 1 addition & 1 deletion docs/en/rules/Azure.Cosmos.DisableLocalAuth.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
severity: Critical
pillar: Security
category: SE:05 Identity and access
category: SE:05 Identity and access management
resource: Cosmos DB
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Cosmos.DisableLocalAuth/
---
Expand Down
4 changes: 2 additions & 2 deletions docs/en/rules/Azure.FrontDoor.WAF.Enabled.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
severity: Critical
pillar: Security
category: Application endpoints
category: SE:06 Network controls
resource: Front Door
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.FrontDoor.WAF.Enabled/
---
Expand All @@ -25,7 +25,7 @@ Consider enabling WAF policy.

## LINKS

- [Best practices for endpoint security on Azure](https://learn.microsoft.com/azure/architecture/framework/security/design-network-endpoints)
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
- [Securing PaaS deployments](https://learn.microsoft.com/azure/security/fundamentals/paas-deployments#install-a-web-application-firewall)
- [Policy settings for Web Application Firewall on Azure Front Door](https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-policy-settings#waf-state)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.network/frontdoorwebapplicationfirewallpolicies)
4 changes: 2 additions & 2 deletions docs/en/rules/Azure.Storage.Firewall.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
severity: Important
pillar: Security
category: Application endpoints
category: SE:06 Network controls
resource: Storage Account
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.Storage.Firewall/
---
Expand Down Expand Up @@ -101,7 +101,7 @@ Azure storage firewall is not supported for Cloud Shell storage accounts.

## LINKS

- [Public endpoints](https://learn.microsoft.com/azure/architecture/framework/security/design-network-endpoints#public-endpoints)
- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
- [Configure Azure Storage firewalls and virtual networks](https://learn.microsoft.com/azure/storage/common/storage-network-security)
- [Use private endpoints for Azure Storage](https://learn.microsoft.com/azure/storage/common/storage-private-endpoints)
- [Persist files in Azure Cloud Shell](https://learn.microsoft.com/azure/cloud-shell/persisting-shell-storage)
Expand Down
6 changes: 3 additions & 3 deletions docs/en/rules/Azure.VM.ScriptExtensions.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
reviewed: 2022-11-16
severity: Important
pillar: Security
category: Secrets
category: SE:02 Secured development lifecycle
resource: Virtual Machine
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.VM.ScriptExtensions/
---
Expand Down Expand Up @@ -75,7 +75,7 @@ resource script 'Microsoft.Compute/virtualMachines/extensions@2015-06-15' = {

## LINKS

- [Secure application configuration and dependencies](https://learn.microsoft.com/azure/architecture/framework/security/design-app-dependencies)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.compute/virtualmachines?pivots=deployment-language-bicep)
- [SE:02 Secured development lifecycle](https://learn.microsoft.com/azure/well-architected/security/secure-development-lifecycle)
- [Windows Custom Script Extensions](https://learn.microsoft.com/azure/virtual-machines/extensions/custom-script-windows)
- [Linux Custom Script Extensions](https://learn.microsoft.com/azure/virtual-machines/extensions/custom-script-linux)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.compute/virtualmachines/extensions)
6 changes: 3 additions & 3 deletions docs/en/rules/Azure.VMSS.ScriptExtensions.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
reviewed: 2022-11-16
severity: Important
pillar: Security
category: Secrets
category: SE:02 Secured development lifecycle
resource: Virtual Machine Scale Sets
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.VMSS.ScriptExtensions/
---
Expand Down Expand Up @@ -80,6 +80,6 @@ extensionProfile: {

## LINKS

- [Secure application configuration and dependencies](https://learn.microsoft.com/azure/architecture/framework/security/design-app-dependencies)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.compute/virtualmachinescalesets/extensions)
- [SE:02 Secured development lifecycle](https://learn.microsoft.com/azure/well-architected/security/secure-development-lifecycle)
- [Azure VMSS Extensions Overview](https://learn.microsoft.com/azure/virtual-machines/extensions/overview)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.compute/virtualmachinescalesets/extensions)

0 comments on commit 61e0cf4

Please sign in to comment.