Managing WAF Policies and DDoS protection plans with Azure Firewall Manager

Published Jun 29 2022 06:21 AM 1,945 Views
Microsoft

Written in collaboration with @ShabazShaik and @gusmodena.

 

As your organization’s security requirements grow, it becomes difficult to manage all the perimeter security technologies. To simplify the management of cloud-based network security, we can use Azure Firewall Manager and its centralized management dashboard to gain visibility and centrally configure capabilities for Azure Firewall, Azure WAF and DDoS Protection technologies. In this blog we will specifically focus on using Azure Firewall Manager for WAF Policy Management and Distributed Denial of Service (DDoS) Protection plan management. For more details on Network Security Management with Azure Firewall Manager, please refer to this blog AZ-FWM-Blog.

 

Azure Firewall Manager is a security management service that provides central security policy and route management for cloud-based security perimeters. Azure Firewall Manager has been available for managing Firewall policies, and now Azure Firewall Manager also centrally manages Azure WAF policies and DDoS protection Plans. Azure Firewall Manager features are:

 

  1. Hierarchical Firewall policies
  2. Centralized route management
  3. Multi Region availability
  4. Integration with third-party security-as-a-service providers
  5. Centralized WAF Policy Management
  6. Manage DDoS Protection plans for your virtual networks
  7. Monitor Network Security Posture

 

Centralized WAF Policy Management

 

Azure Web Application Firewall is a cloud-native WAF service that provides centralized OWASP and bot protection for web apps including common hacking techniques such as SQL injection and security vulnerabilities such as cross-site scripting. These WAF protection capabilities are available as part of Application Gateway and Azure Front Door services, and users need to create a separate WAF policy for each of their Application Gateway and Front Door deployments. In Azure Firewall Manager, you can now manage and protect your Azure Front Door or Application Gateway v2 deployments by associating WAF policies, at scale. This allows you to view all your key deployments in one central place.

 

Here is a step-by-step demonstration of creating and associating WAF policies with Application Gateway.

 

To create a WAF policy by importing settings from an existing policy, follow the steps below:

 

  1. On the Azure Firewall Manager page, select Web Application Firewall Policies
  2. Select Add to create a new WAF policy. In this example, we are creating a new policy by importing settings from an existing WAF policy
  3. Select the WAF policy that you want to import the settings from
  4. Select either an existing resource group or Create New
  5. Give a name for the new WAF policy. For new WAF policy for Front Door, the name must begin with a letter and contain only letters and numbers
  6. Select the region
  7. Select “Enable this policy”
  8. Select Add

 

FWM-ImportSettingsWAFPol-v2.gif

 

To Associate WAF policy, follow the steps below:

 

Through Firewall Manager we can also associate/disassociate WAF policies from our application delivery platforms (Front Door or Application Gateway). When associating a new WAF policy at same level as another WAF policy, a replacement will happen and only the last policy associated will be effective.

 

  1. On the Azure Firewall Manager page, select Application Delivery Platforms
  2. Select your application delivery platform (Front Door or Application Gateway) to associate a WAF policy. In this example, we are associating a WAF policy to an Application Gateway
  3. Select Manage Security and then select Associate WAF policy
  4. Select either an existing policy or Create New
  5. Select the level you want to apply the WAF policy (Globally, HTTP Listener or Route Path). In this example, we are selecting Listener
  6. Select Associate

 

FWM-AssociateWAFPol-v3.gif

 

As we can see in the above demonstration there are multiple WAF policies associated with the Application Gateway, being one globally and another at listener level. Application Gateways require at least one WAF policy applied globally. So, we can only remove associations from Listener and Route Path.

 

To Upgrade from WAF config to WAF policy, follow the steps below:

 

In addition, the platform supports administrators to upgrade from a WAF config to WAF policies for Application Gateways, by selecting the service and Upgrade from WAF configuration. This allows for a more seamless process for migrating to WAF policies, which supports WAF policy settings, managed rulesets, exclusions, and disabled rule-groups.

 

As a note, all WAF configurations that were previously created in Application Gateway can be done through WAF policy.

 

  1. On the Azure Firewall Manager page, select Application Delivery Platforms
  2. Select Upgrade from WAF configuration on the Application Gateway which you want to make apply the change
  3. Select either an existing resource group or Create New
  4. Give a name for the new WAF policy
  5. Select the region
  6. Select “Enable this policy”
  7. Select Upgrade

 

FWM-UpgradeWafConfigToWafPolicy-v3.gif

 

Once the upgrade is complete, there is no option to change it back to WAF config.

 

DDoS Protection Plan Management with Azure Firewall:

 

Distributed denial of service (DDoS) attacks are some of the main availability and security concerns faced by customers with applications in the cloud. A DDoS attack attempts to exhaust an application's resources, making the application unavailable to legitimate users.

 

Azure DDoS Protection Standard, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks. It is automatically tuned to help protect your specific Azure resources in a virtual network. Protection is simple to enable on any new or existing virtual network, and it requires no application or resource changes.

 

What are the scalability challenges with the current way DDoS plan gets implemented and how is Firewall Manager going to help? With the help of Azure Firewall Manager, you can now enable DDoS Protection Plan Standard on your virtual networks across subscriptions and regions.

 

Here is a step-by-step demonstration of Enabling a DDoS Protection plan on Azure Firewall Manager and associating it with a Virtual Network.

 

To create a DDoS Protection Plan, follow the steps below:

 

  1. On the Azure Firewall Manager page, select DDoS Protection Plans
  2. Select Create
  3. For Resource Group, select an existing resource group you have or create a new resource group
  4. Under instance details, give a name to the DDoS protection Plan
  5. Select the Region for the plan
  6. Select “Review + Create” and then select Create

 

DDoSPlan_Gif.gif

 

To associate a DDoS Protection Plan with a Virtual Network, follow the steps below:

 

  1. On the Azure Firewall Manager page, select Virtual Networks
  2. Select the check box for the Virtual Network to which you want to associate the DDoS protection plan you created
  3. Select Manage security and select Manage DDoS Protection Plan
  4. Under Manage DDoS Protection Plan, Enable DDoS Protection Plan Standard
  5. For, DDoS Protection Plan, select the DDoS Protection Plan you created
  6. Select Save
  7. After the deployment is complete select Refresh

 

VNET_Association_DDos.gif

 

Conclusion:

 

As we have seen above, Azure Firewall Manager simplifies the management of cloud security perimeters by enforcing consistency on all the Network Security Configuration, ease and scale of management, and visibility on a single dashboard. To learn more about Azure Firewall Manager, please visit the Azure Firewall Manager documentation.

Version history
Last update:
‎Jun 29 2022 08:26 AM
Updated by: