Add a web application firewall in Azure Security Center

Azure Security Center may recommend that you add a web application firewall (WAF) from a Microsoft partner to secure your web applications. This document walks you through an example of how to apply this recommendation.

A WAF recommendation is shown for any public facing IP (either Instance Level IP or Load Balanced IP) that has an associated network security group with open inbound web ports (80,443).

Security Center recommends that you provision a WAF to help defend against attacks targeting your web applications on virtual machines and on App Service Environment. An App Service Environment (ASE) is a Premium service plan option of Azure App Service that provides a fully isolated and dedicated environment for securely running Azure App Service apps. To learn more about ASE, see the App Service Environment Documentation.

Note

This document introduces the service by using an example deployment. This document is not a step-by-step guide.

Implement the recommendation

  1. In the Recommendations blade, select Secure web application using web application firewall. Secure web Application
  2. In the Secure your web applications using web application firewall blade, select a web application. The Add a Web Application Firewall blade opens. Add a web application firewall
  3. You can choose to use an existing web application firewall if available or you can create a new one. In this example, there are no existing WAFs available so we create a WAF.
  4. To create a WAF, select a solution from the list of integrated partners. In this example, we select Barracuda Web Application Firewall.
  5. The Barracuda Web Application Firewall blade opens providing you information about the partner solution. Select Create in the information blade.

    Firewall information blade

  6. The New Web Application Firewall blade opens, where you can perform VM Configuration steps and provide WAF Information. Select VM Configuration.

  7. In the VM Configuration blade, you enter information required to spin up the virtual machine that runs the WAF. VM configuration
  8. Return to the New Web Application Firewall blade and select WAF Information. In the WAF Information blade, you configure the WAF itself. Step 7 allows you to configure the virtual machine on which the WAF runs and step 8 enables you to provision the WAF itself.

Finalize application protection

  1. Return to the Recommendations blade. A new entry was generated after you created the WAF, called Finalize application protection. This entry lets you know that you need to complete the process of actually wiring up the WAF within the Azure Virtual Network so that it can protect the application.

    Finalize application protection

  2. Select Finalize application protection. A new blade opens. You can see that there is a web application that needs to have its traffic rerouted.

  3. Select the web application. A blade opens that gives you steps for finalizing the web application firewall setup. Complete the steps, and then select Restrict traffic. Security Center then does the wiring-up for you.

    Restrict traffic

Note

You can protect multiple web applications in Security Center by adding these applications to your existing WAF deployments.

The logs from that WAF are now fully integrated. Security Center can start automatically gathering and analyzing the logs so that it can surface important security alerts to you.

Next steps

This document showed you how to implement the Security Center recommendation "Add a web application." To learn more about configuring a web application firewall, see the following:

To learn more about Security Center, see the following: