7.14 Ensure request body inspection is enabled in Azure Web Application Firewall policy on Azure Application Gateway

Information

Enable request body inspection so that the Web Application Firewall evaluates the contents of HTTP message bodies for potential threats.

Enabling request body inspection strengthens security by allowing the Web Application Firewall to detect common attacks, such as SQL injection and cross-site scripting.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remediate from Azure Portal

- Go to Application gateways.
- Click the name of an application gateway.
- Under Settings, click Web application firewall.
- Under Associated web application firewall policy, click the policy name.
- Under Settings, click Policy settings.
- Check the box next to Enforce request body inspection.
- Click Save.
- Repeat steps 1-7 for each application gateway and firewall policy requiring remediation.

Remediate from Azure CLI

For each firewall policy requiring remediation, run the following command to enable request body inspection:

az network application-gateway waf-policy update --ids <firewall-policy> --policy-settings request-body-check=true

Impact:

Minor performance impact on the Web Application Firewall. Additional effort may be required to monitor findings.

See Also

https://workbench.cisecurity.org/benchmarks/21611

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(8), CSCv7|12.9

Plugin: microsoft_azure

Control ID: 0f43dbe504e85b10851ae173d22a40223a93f9ca557d0e8b3612ef9e16d3a894