Book Image

Implementing Azure Solutions - Second Edition

By : Florian Klaffenbach, Markus Klein, Sebastian Hoppe, Oliver Michalski, Jan-Henrik Damaschke
Book Image

Implementing Azure Solutions - Second Edition

By: Florian Klaffenbach, Markus Klein, Sebastian Hoppe, Oliver Michalski, Jan-Henrik Damaschke

Overview of this book

<p>Microsoft Azure offers numerous solutions that can shape the future of any business. However, the major challenge that architects and administrators face lies in implementing these solutions. </p><p>Implementing Azure Solutions helps you overcome this challenge by enabling you to implement Azure Solutions effectively. The book begins by guiding you in choosing the backend structure for your solutions. You will then work with the Azure toolkit and learn how to use Azure Managed Apps to share your solutions with the Azure service catalog. The book then focuses on various implementation techniques and best practices such as implementing Azure Cloud Services by configuring, deploying, and managing cloud services. As you progress through the chapters, you’ll learn how to work with Azure-managed Kubernetes and Azure Container Services. </p><p>By the end of the book, you will be able to build robust cloud solutions on Azure.</p>
Table of Contents (14 chapters)

Web Application Firewall 

Web Application Firewall (WAF) is an operation mode of application gateway that provides centralized protection of customer web applications from most common exploits and vulnerabilities.

WAF is based on rules from the OWASP core rule sets 3.0 or 2.2.9, which can also be customized. It automatically updates it self to include protection against new vulnerabilities and exploits, without any additional configuration.

Following features are currently included in the service: 

  • SQL injection protection
  • Cross site scripting protection
  • Common Web Attacks Protection like command injection, HTTP request smuggling, HTTP response splitting, or remote file inclusion attack
  • Protection against HTTP protocol violations
  • Protection against HTTP protocol anomalies like missing host user-agent and accept headers
  • Prevention against bots, crawlers, and scanners
  • Detection of common application misconfigurations (that is, Apache, IIS, and so on.)