Avoid configuring Front Door WAF rule exclusions#
Security · Front Door · Rule · 2022_09 · Critical
Use recommended rule groups in Front Door Web Application Firewall (WAF) policies to protect back end resources. Avoid configuring rule exclusions.
Description#
Front Door WAF supports exclusions lists.
Sometimes Web Application Firewall (WAF) might block a request that you want to allow for your application. WAF exclusion lists allow you to omit certain request attributes from a WAF evaluation. However, it should be allowed and only used as a last resort.
Recommendation#
Avoid configuring Front Door WAF rule exclusions.
Examples#
Configure with Azure template#
To deploy WAF policies that pass this rule:
- Remove any rule exclusions by:
- Set the
exclusions
property for each managed rule group to an empty array. OR - Remove the
exclusions
property for each managed rule group.
- Set the
For example:
Azure Template snippet
{
"type": "Microsoft.Network/FrontDoorWebApplicationFirewallPolicies",
"apiVersion": "2022-05-01",
"name": "[parameters('name')]",
"location": "Global",
"sku": {
"name": "Premium_AzureFrontDoor"
},
"properties": {
"managedRules": {
"managedRuleSets": [
{
"ruleSetType": "Microsoft_DefaultRuleSet",
"ruleSetVersion": "2.0",
"ruleSetAction": "Block",
"exclusions": [],
"ruleGroupOverrides": []
},
{
"ruleSetType": "Microsoft_BotManagerRuleSet",
"ruleSetVersion": "1.0",
"ruleSetAction": "Block",
"exclusions": [],
"ruleGroupOverrides": []
}
]
},
"policySettings": {
"enabledState": "Enabled",
"mode": "Prevention"
}
}
}
Configure with Bicep#
To deploy WAF policies that pass this rule:
- Remove any rule exclusions by:
- Set the
exclusions
property for each managed rule group to an empty array. OR - Remove the
exclusions
property for each managed rule group.
- Set the
For example:
Azure Bicep snippet
resource waf 'Microsoft.Network/FrontDoorWebApplicationFirewallPolicies@2022-05-01' = {
name: name
location: 'Global'
sku: {
name: 'Premium_AzureFrontDoor'
}
properties: {
managedRules: {
managedRuleSets: [
{
ruleSetType: 'Microsoft_DefaultRuleSet'
ruleSetVersion: '2.0'
ruleSetAction: 'Block'
exclusions: []
ruleGroupOverrides: []
}
{
ruleSetType: 'Microsoft_BotManagerRuleSet'
ruleSetVersion: '1.0'
ruleSetAction: 'Block'
exclusions: []
ruleGroupOverrides: []
}
]
}
policySettings: {
enabledState: 'Enabled'
mode: 'Prevention'
}
}
}
Links#
- SE:06 Network controls
- Securing PaaS deployments
- Policy settings for Web Application Firewall on Azure Front Door
- Web Application Firewall CRS rule groups and rules
- Bot protection overview
- Web Application Firewall best practices
- Azure deployment reference