turbot/steampipe-mod-azure-compliance

Control: Web Application Firewall (WAF) should be enabled for Application Gateway

Description

Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.application_gateway_waf_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.application_gateway_waf_enabled --share

SQL

This control uses a named query:

select
ag.id resource,
case
when web_application_firewall_configuration is not null then 'ok'
else 'alarm'
end as status,
case
when web_application_firewall_configuration is not null then ag.name || ' WAF enabled.'
else ag.name || ' WAF disabled.'
end as reason
, ag.resource_group as resource_group
, sub.display_name as subscription
from
azure_application_gateway as ag
join azure_subscription as sub on sub.subscription_id = ag.subscription_id;

Tags