Preventing Code Injection Vulnerability using Azure WAF on Application Gateway
Description
Azure WAF Policies are pre-configured groups of rules that can be applied to an application to protect it from common exploits and vulnerabilities. WAF Policies can be applied to an application gateway or a front door to protect web applications from malicious attacks.
Organizations can also create custom WAF Policies to protect against specific threats. Custom WAF Policies can be created using the Azure Portal, Azure CLI, or Azure PowerShell. Custom WAF policies can help protect against common attacks such as SQL injection, cross-site scripting, and cross-site request forgery.
In this lab, students will create a WAF policy custom policy to identify and block code injection attacks and then test the rules using a simulated code injection attempt.
Learning objectives
Upon completion of this advanced-level lab, you will be able to:
- Create Web Application Firewall (WAF) Policies.
- Associate WAF Policies with Application Gateway
- Create Custom WAF Policies
- Secure Applications with Custom WAF policies to prevent malicious attacks.
Intended audience
- Candidates for Azure Security Engineer Associate (AZ-500)
- Cloud Architects
- Security Engineers
- Network Engineers
- Cloud Administrators
Prerequisites
Familiarity with the following will be beneficial but is not required:
Updates
September 4th, 2024 - Resolved environment error