Skip to content

Commit

Permalink
Merge pull request #541 from Azure/AppDelivery-categories
Browse files Browse the repository at this point in the history
Updated categories
  • Loading branch information
erjosito authored Nov 7, 2023
2 parents aff689b + d908741 commit 94337e7
Showing 1 changed file with 13 additions and 34 deletions.
47 changes: 13 additions & 34 deletions checklists/network_appdelivery_checklist.en.json
Original file line number Diff line number Diff line change
Expand Up @@ -244,7 +244,7 @@
"link": "https://learn.microsoft.com/azure/frontdoor/best-practices#use-end-to-end-tls"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Use HTTP to HTTPS redirection with Azure Front Door. Support older clients by redirecting them to an HTTPS request automatically.",
"waf": "Security",
Expand All @@ -254,7 +254,7 @@
"link": "https://learn.microsoft.com/azure/frontdoor/best-practices#use-http-to-https-redirection"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Enable the Azure Front Door WAF. Protect your application from a range of attacks.",
"waf": "Security",
Expand All @@ -265,7 +265,7 @@
"link": "https://learn.microsoft.com/azure/frontdoor/best-practices#enable-the-waf"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Tune the Azure Front Door WAF for your workload. Reduce false positive detections.",
"waf": "Security",
Expand All @@ -276,7 +276,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#tune-your-waf"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Use prevention mode with the Azure Front Door WAF. Prevention mode ensures that the WAF blocks malicious requests.",
"waf": "Security",
Expand All @@ -287,7 +287,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#use-prevention-mode"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Enable the Azure Front Door WAF default rule sets. The default rule sets detect and block common attacks.",
"waf": "Security",
Expand All @@ -298,7 +298,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#enable-default-rule-sets"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Enable the Azure Front Door WAF bot management rules. The bot rules detect good and bad bots.",
"waf": "Security",
Expand All @@ -309,7 +309,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#enable-bot-management-rules"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Use the latest Azure Front Door WAF ruleset versions. Ruleset updates are regularly updated to take account of the current threat landscape.",
"waf": "Security",
Expand All @@ -319,7 +319,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#use-the-latest-ruleset-versions"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Add rate limiting to the Azure Front Door WAF. Rate limiting blocks clients accidentally or intentionally sending large amounts of traffic in a short period of time.",
"waf": "Security",
Expand All @@ -329,7 +329,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#add-rate-limiting"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Use a high threshold for Azure Front Door WAF rate limits. High rate limit thresholds avoid blocking legitimate traffic, while still providing protection against extremely high numbers of requests that might overwhelm your infrastructure. ",
"waf": "Security",
Expand All @@ -339,7 +339,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#use-a-high-threshold-for-rate-limits"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Geo-filter traffic by using the Azure Front Door WAF. Allow traffic only from expected regions, and block traffic from other regions.",
"waf": "Security",
Expand All @@ -349,7 +349,7 @@
"link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#geo-filter-traffic"
},
{
"category": "Network topology and connectivity",
"category": "Network Topology and Connectivity",
"subcategory": "App delivery",
"text": "Specify the unknown (ZZ) location when geo-filtering traffic with the Azure Front Door WAF. Avoid accidentally blocking legitimate requests when IP addresses can't be geo-matched.",
"waf": "Security",
Expand All @@ -360,29 +360,8 @@
}
],
"categories": [
{
"name": "Azure Billing and Microsoft Entra ID Tenants"
},
{
"name": "Identity and Access Management"
},
{
"name": "Network Topology and Connectivity"
},
{
"name": "Security"
},
{
"name": "Management"
},
{
"name": "Resource Organization"
},
{
"name": "Platform Automation and DevOps"
},
{
"name": "Governance"
}
],
"waf": [
Expand Down Expand Up @@ -444,8 +423,8 @@
}
],
"metadata": {
"name": "Azure Application Delivery",
"name": "Azure Application Delivery Networking",
"state": "GA",
"timestamp": "November 06, 2023"
}
}
}

0 comments on commit 94337e7

Please sign in to comment.