Skip to content

Commit 07443c4

Browse files
committed
start azure policy
1 parent 8fb6c46 commit 07443c4

File tree

2 files changed

+195
-0
lines changed

2 files changed

+195
-0
lines changed
Lines changed: 195 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,195 @@
1+
---
2+
title: Use Azure Policy to help secure your Azure Firewall deployments
3+
description: You can use Azure Policy to help secure your Azure Firewall deployments.
4+
author: vhorne
5+
ms.author: victorh
6+
ms.service: azure-firewall
7+
ms.topic: how-to
8+
ms.date: 09/05/2024
9+
---
10+
11+
<!--
12+
Remove all the comments in this template before you sign-off or merge to the main branch.
13+
14+
This template provides the basic structure of a How-to article pattern. See the
15+
[instructions - How-to](../level4/article-how-to-guide.md) in the pattern library.
16+
17+
You can provide feedback about this template at: https://aka.ms/patterns-feedback
18+
19+
How-to is a procedure-based article pattern that show the user how to complete a task in their own environment. A task is a work activity that has a definite beginning and ending, is observable, consist of two or more definite steps, and leads to a product, service, or decision.
20+
21+
-->
22+
23+
<!-- 1. H1 -----------------------------------------------------------------------------
24+
25+
Required: Use a "<verb> * <noun>" format for your H1. Pick an H1 that clearly conveys the task the user will complete.
26+
27+
For example: "Migrate data from regular tables to ledger tables" or "Create a new Azure SQL Database".
28+
29+
* Include only a single H1 in the article.
30+
* Don't start with a gerund.
31+
* Don't include "Tutorial" in the H1.
32+
33+
-->
34+
35+
# Use Azure Policy to help secure your Azure Firewall deployments
36+
37+
<!-- 2. Introductory paragraph ----------------------------------------------------------
38+
39+
Required: Lead with a light intro that describes, in customer-friendly language, what the customer will do. Answer the fundamental “why would I want to do this?” question. Keep it short.
40+
41+
Readers should have a clear idea of what they will do in this article after reading the introduction.
42+
43+
* Introduction immediately follows the H1 text.
44+
* Introduction section should be between 1-3 paragraphs.
45+
* Don't use a bulleted list of article H2 sections.
46+
47+
Example: In this article, you will migrate your user databases from IBM Db2 to SQL Server by using SQL Server Migration Assistant (SSMA) for Db2.
48+
49+
-->
50+
51+
Azure Policy is a service in Azure that allows you to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy does this by evaluating your resources for noncompliance with assigned policies. For example, you can have a policy to allow only a certain size of virtual machines in your environment or to enforce a specific tag on resources.
52+
53+
Azure Policy can be used to govern Azure Firewall configurations by applying policies that define what configurations are allowed or disallowed. This helps ensure that the firewall settings are consistent with organizational compliance requirements and security best practices.
54+
55+
<!---Avoid notes, tips, and important boxes. Readers tend to skip over them. Better to put that info directly into the article text.
56+
57+
-->
58+
59+
<!-- 3. Prerequisites --------------------------------------------------------------------
60+
61+
Required: Make Prerequisites the first H2 after the H1.
62+
63+
* Provide a bulleted list of items that the user needs.
64+
* Omit any preliminary text to the list.
65+
* If there aren't any prerequisites, list "None" in plain text, not as a bulleted item.
66+
67+
-->
68+
69+
## Prerequisites
70+
71+
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
72+
73+
<!-- 4. Task H2s ------------------------------------------------------------------------------
74+
75+
Required: Multiple procedures should be organized in H2 level sections. A section contains a major grouping of steps that help users complete a task. Each section is represented as an H2 in the article.
76+
77+
For portal-based procedures, minimize bullets and numbering.
78+
79+
* Each H2 should be a major step in the task.
80+
* Phrase each H2 title as "<verb> * <noun>" to describe what they'll do in the step.
81+
* Don't start with a gerund.
82+
* Don't number the H2s.
83+
* Begin each H2 with a brief explanation for context.
84+
* Provide a ordered list of procedural steps.
85+
* Provide a code block, diagram, or screenshot if appropriate
86+
* An image, code block, or other graphical element comes after numbered step it illustrates.
87+
* If necessary, optional groups of steps can be added into a section.
88+
* If necessary, alternative groups of steps can be added into a section.
89+
90+
-->
91+
## Policies available for Azure Firewall
92+
93+
The following policies are available for Azure Firewall:
94+
95+
- **Enable Threat Intelligence in Azure Firewall Policy**
96+
97+
This policy makes sure that any Azure Firewall configuration without threat intel enabled is marked as noncompliant.
98+
- **Deploy Azure Firewall across Multiple Availability Zones**
99+
100+
The policy restricts Azure Firewall deployment to be only allowed with Multiple Availability Zone configuration.
101+
- **Upgrade Azure Firewall Standard to Premium**
102+
103+
This policy recommends upgrading Azure Firewall Standard to Premium so that all the Premium version advanced firewall features can be used. This further enhances the security of the network.
104+
- **Azure Firewall Policy Analytics should be enabled**
105+
106+
This policy ensures that the Policy Analytics is enabled on the firewall to effectively tune and optimize firewall rules.
107+
- **Azure Firewall should only allow Encrypted Traffic**
108+
109+
This policy analyses existing rules and ports in Azure firewall policy and audits firewall policy to make sure that only encrypted traffic is allowed into the environment.
110+
- **Azure Firewall should have DNS Proxy Enabled**
111+
112+
This Policy Ensures that DNS proxy feature is enabled on Azure Firewall deployments.
113+
- **Enable IDPS in Azure Firewall Premium Policy**
114+
115+
This policy ensures that the IDPS feature is enabled on Azure Firewall deployments to effectively protect the environment from various threats and vulnerabilities.
116+
- **Enable TLS inspection on Azure Firewall Policy**
117+
118+
This policy mandates that TLS inspection is enabled to detect, alert, and mitigate malicious activity in HTTPS traffic.
119+
- **Migrate from Azure Firewall Classic Rules to Firewall Policy**
120+
121+
This policy recommends migrating from Firewall Classic Rules to Firewall Policy.
122+
- **VNET with specific tag must have Azure Firewall Deployed**
123+
124+
This policy finds all VNETs with a specified tag and checks if there's an Azure Firewall deployed, and flags it as noncompliant if no Azure Firewall exists.
125+
126+
The following steps show how you can create an Azure Policy that enforces all Firewall Policies to have the Threat Intelligence feature enabled (either **Alert Only**, or **Alert and deny**). The Azure Policy scope is set to the resource group that you create.
127+
128+
## Create a resource group
129+
130+
This resource group is set as the scope for the Azure Policy, and is where you create the Firewall Policy.
131+
132+
1. From the Azure portal, select **Create a resource**.
133+
1. In the search box, type **resource group** and press Enter.
134+
1. Select **Resource group** from the search results.
135+
1. Select **Create**.
136+
1. Select your subscription.
137+
1. Type a name for your resource group.
138+
1. Select a region.
139+
1. Select **Next : Tags**.
140+
1. Select **Next : Review + create**.
141+
1. Select **Create**.
142+
143+
## Create an Azure Policy
144+
145+
Now create an Azure Policy in your new resource group. This policy ensures that any firewall policies must have Threat Intelligence enabled.
146+
147+
1. From the Azure portal, select **All services**.
148+
1. In the filter box, type **policy** and press Enter.
149+
1. Select **Policy** in the search results.
150+
1. On the Policy page, select **Getting started**.
151+
1. Under **Assign policies**, select **View definitions**.
152+
1. On the Definitions page, type **firewall**, in the search box.
153+
1. Select **Azure Firewall Policy should enable Threat Intelligence**.
154+
1. Select **Assign policy**.
155+
1. For **Scope**, select you subscription and your new resource group.
156+
1. Select **Select**.
157+
1. Select **Next**.
158+
1. On the **Parameters** page, clear the **Only show parameters that need input or review** check box.
159+
1. For **Effect**, select **Deny**.
160+
1. Select **Review + create**.
161+
1. Select **Create**.
162+
163+
## Create a Firewall Policy
164+
165+
Now you attempt to create a Firewall Policy with Threat Intelligence disabled.
166+
167+
1. From the Azure portal, select **Create a resource**.
168+
1. In the search box, type **firewall policy** and press Enter.
169+
1. Select **Firewall Policy** in the search results.
170+
1. Select **Create**.
171+
1. Select your subscription.
172+
1. For **Resource group**, select the resource group that you created previously.
173+
1. In the **Name** text box, type a name for your policy.
174+
1. Select **Next : DNS Settings**.
175+
1. Continue selecting through to the **Threat intelligence** page.
176+
1. For **Threat intelligence mode**, select **Disabled**.
177+
1. Select **Review + create**.
178+
179+
You should see an error that says your resource was disallowed by policy, confirming that your Azure Policy doesn't allow firewall policies that have Threat Intelligence disabled.
180+
181+
:::image type="content" source="media/firewall-azure-policy/azure-policy.png" lightbox="media/firewall-azure-policy/azure-policy.png" alt-text="Screenshot shown policy create denial.":::
182+
183+
<!-- 5. Next step/Related content------------------------------------------------------------------------
184+
185+
Optional: You have two options for manually curated links in this pattern: Next step and Related content. You don't have to use either, but don't use both.
186+
- For Next step, provide one link to the next step in a sequence. Use the blue box format
187+
- For Related content provide 1-3 links. Include some context so the customer can determine why they would click the link. Add a context sentence for the following links.
188+
189+
-->
190+
191+
## Related content
192+
193+
- [What is Azure Policy?](../governance/policy/overview.md)
194+
195+
102 KB
Loading

0 commit comments

Comments
 (0)