From d908741cc6930374e79af354c9577a9183f5c32b Mon Sep 17 00:00:00 2001 From: Jose Moreno Date: Mon, 6 Nov 2023 12:17:45 +0100 Subject: [PATCH] Updated categories --- .../network_appdelivery_checklist.en.json | 47 +++++-------------- 1 file changed, 13 insertions(+), 34 deletions(-) diff --git a/checklists/network_appdelivery_checklist.en.json b/checklists/network_appdelivery_checklist.en.json index 71a85fc7d..fb984336e 100644 --- a/checklists/network_appdelivery_checklist.en.json +++ b/checklists/network_appdelivery_checklist.en.json @@ -244,7 +244,7 @@ "link": "https://learn.microsoft.com/azure/frontdoor/best-practices#use-end-to-end-tls" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Use HTTP to HTTPS redirection with Azure Front Door. Support older clients by redirecting them to an HTTPS request automatically.", "waf": "Security", @@ -254,7 +254,7 @@ "link": "https://learn.microsoft.com/azure/frontdoor/best-practices#use-http-to-https-redirection" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Enable the Azure Front Door WAF. Protect your application from a range of attacks.", "waf": "Security", @@ -265,7 +265,7 @@ "link": "https://learn.microsoft.com/azure/frontdoor/best-practices#enable-the-waf" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Tune the Azure Front Door WAF for your workload. Reduce false positive detections.", "waf": "Security", @@ -276,7 +276,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#tune-your-waf" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Use prevention mode with the Azure Front Door WAF. Prevention mode ensures that the WAF blocks malicious requests.", "waf": "Security", @@ -287,7 +287,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#use-prevention-mode" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Enable the Azure Front Door WAF default rule sets. The default rule sets detect and block common attacks.", "waf": "Security", @@ -298,7 +298,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#enable-default-rule-sets" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Enable the Azure Front Door WAF bot management rules. The bot rules detect good and bad bots.", "waf": "Security", @@ -309,7 +309,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#enable-bot-management-rules" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Use the latest Azure Front Door WAF ruleset versions. Ruleset updates are regularly updated to take account of the current threat landscape.", "waf": "Security", @@ -319,7 +319,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#use-the-latest-ruleset-versions" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Add rate limiting to the Azure Front Door WAF. Rate limiting blocks clients accidentally or intentionally sending large amounts of traffic in a short period of time.", "waf": "Security", @@ -329,7 +329,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#add-rate-limiting" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Use a high threshold for Azure Front Door WAF rate limits. High rate limit thresholds avoid blocking legitimate traffic, while still providing protection against extremely high numbers of requests that might overwhelm your infrastructure. ", "waf": "Security", @@ -339,7 +339,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#use-a-high-threshold-for-rate-limits" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Geo-filter traffic by using the Azure Front Door WAF. Allow traffic only from expected regions, and block traffic from other regions.", "waf": "Security", @@ -349,7 +349,7 @@ "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#geo-filter-traffic" }, { - "category": "Network topology and connectivity", + "category": "Network Topology and Connectivity", "subcategory": "App delivery", "text": "Specify the unknown (ZZ) location when geo-filtering traffic with the Azure Front Door WAF. Avoid accidentally blocking legitimate requests when IP addresses can't be geo-matched.", "waf": "Security", @@ -360,29 +360,8 @@ } ], "categories": [ - { - "name": "Azure Billing and Microsoft Entra ID Tenants" - }, - { - "name": "Identity and Access Management" - }, { "name": "Network Topology and Connectivity" - }, - { - "name": "Security" - }, - { - "name": "Management" - }, - { - "name": "Resource Organization" - }, - { - "name": "Platform Automation and DevOps" - }, - { - "name": "Governance" } ], "waf": [ @@ -444,8 +423,8 @@ } ], "metadata": { - "name": "Azure Application Delivery", + "name": "Azure Application Delivery Networking", "state": "GA", "timestamp": "November 06, 2023" } -} \ No newline at end of file +}