WAF and DDoS Protection

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 33 minutes
Difficulty
Intermediate
CEU/CPE
9
Video Transcription
00:01
Hello, Siberians.
00:02
Welcome to this lesson on Web application. Firewall on distributed denial of service protection.
00:09
This lesson is part of the top Madu off the Is that 500 Microsoft Azure security touch not just costs
00:17
quick information on what will be covering in this lesson.
00:20
Well stuck out with an overview off as your wife.
00:23
Well, then, cover application gets we wife
00:26
front stir wife and finally, Azure did. Does protection. Let's get into this
00:32
Web applications I increasingly targeted by militias attacks by exploit commonly known vulnerabilities like sequel injection on the cross site scripting.
00:43
Apart from following good Corden security practices, the Web application firewall can also be used as an other layer of protection against his exploits and vulnerabilities.
00:54
Wife can be deployed with three services in Hajer. There's your application gets way.
01:00
I just fronts, though, on Azure Content Delivery Network, Wife on Azure Content Living Network is currently on the public preview
01:07
and what has features that are customize for each off the specific service for the purpose? If I exam objectives will be looking at the application get way on the front star services,
01:19
the application gets way. It's a Web traffic load balancer that enables us to manage traffic to our Web applications. Traditional note balance as operate at a transport layer on the routes. Traffic based on source. I pee on destination i p. Saw sport on destination parts and protocols. However,
01:38
a politician gets way. Operates on Leah seven
01:42
on its can route traffic based on additional attributes of an http request, for example, your eye path or post EDIs
01:52
wife on application. Get way Supports three men Rosettes the carbo says 3.13 point zero and two points, 2.9 from the open Web application Security project, or what on this rules can l to protect our Web applications from militias activity.
02:08
The more can be said to either detection mode or prevention, not
02:13
detection. More monitors and logs are tried a lot by dozen blocked in
02:17
what prevention? More blocks, intrusions and attacks that divorce the tax but also looks them in. The wife looks
02:24
so here's how the application gets with wife walks.
02:29
First, we create a special subject for the application gets with service
02:34
on. This could be a public face in sub net or private. Submit this the paint on If we're protecting public sufficient Web applications or private Web applications
02:45
when they deploy the application. Get with service into this sub net
02:49
and we configure a wife policy on eat
02:52
a Wife Policy is what we used to manage. The protection rules. The exclusions on other customization, such as foul upload limits.
03:01
No other azure resources should be deployed into the sub net.
03:07
Incoming request from the client should then be directed to go to the application. Get were forced.
03:12
The request as can't in accordance with a wife policy configuration. And they're either delivered to the back and pull or dropped if trades are detected.
03:22
Let's talk about your front stuff.
03:23
Has your front door? Is a eyeless caribou globally distributed application and content to live in network. And what that means is that it's uses the any cats protocol, which pleats tous IPI on Microsoft Global Network to improve global connectivity and performance for Web applications.
03:40
If you still don't understand what the service meets,
03:44
let me show you a diagram that we helped to make it clear in the case of this diagram, as your front door veces client request through a point of presence that is close to the end users.
03:55
It uses the Microsoft I trip put backbone network tow US elevates delivery of the traffic to the back and application instead, off the traffic been voted entirely over the public Internet
04:09
as a wife can be integrated with Azure Francisco. On this way, we can stop. Web application treads are the points that close to the end. Jesu.
04:18
I just wanted eyes also global service so wife can take advantage of this.
04:24
Let's talk about the details. Protection in Hajer
04:28
did those attacks as some of the largest availability and security concerns facing customers that are moving applications to the cloud
04:36
on it did not attack attempts to exhaust on applications resources on making the application on available to legitimate users.
04:46
Do Those attacks can be targeted at any endpoints that is publically reachable through the Internet
04:50
As you offers Dido's protection at two different levels forced? We have the basic service here.
04:58
This is automatically and neighborhood as part of the azure platform,
05:01
and there is no cost of these.
05:03
It's provide protection for I P Before on my previous six as your public I P addresses that we use,
05:12
we don't have the standups here.
05:14
This provides additional mitigation capabilities over the basic service here,
05:19
and it specifically targets as your virtual network resources.
05:25
There is an added costs to enable this.
05:28
They're different types of Dido's attacks. So let's review them toe. Understand which types off these attacks that did understand that protection can provide mitigations against
05:39
the first type of Dido's attack is the volumetric attacks.
05:43
So there taco is to flood the network clear with a substantial amount off. Similarly, legitimate traffic
05:51
on the attack types includes things like UDP floods, amplification floats on orders proved pocket floats.
06:00
Did This protection standard can be used to me to get these,
06:02
and it does that by observing on scrubbing the traffic, which I just global network skill. And it does this automatically.
06:13
We don't have. The political attacks on this Types of attacks looks to exploit weaknesses in the layer tree on layer for protocol stack.
06:21
So this includes attacks like see flood attacks, reflection attacks on other protocol attacks.
06:28
Did those protections stand that can help to mitigate against this by differentiating between militias on legitimate traffic on blocking militias traffic
06:38
on its uses. Various methods for this, including mission land in our gardens.
06:43
And finally we have the resources or application the attacks.
06:46
Now this attack star gets Web application packets. At least seven they try to destroy The transmission of data between the host
06:56
on attack types include things like http protocol violations sequel injection, cross site scripting on other Leah seven attacks,
07:05
we need to use a Web application firewall like the ones that we've described in this lesson to protect against this.
07:15
He has some supplementary links for further studies on the topics covered in this lesson.
07:20
And here's a somebody off what we covered.
07:24
We started with an overview off as your wife.
07:27
Well, then discussed application gets we wife
07:30
front, the wife on Finally Azure, Dido's protection.
07:34
Thanks very much for watching on. I'll see you in the next lesson.
Up Next
AZ-500: Microsoft Azure Security Technologies

In this Microsoft Azure Security Technologies (AZ-500) training, students will learn the skills that are needed to pass the AZ-500 certification exam. All exam topics are covered as well as exam preparation strategies and hands-on practice.

Instructed By