Skip to content

Commit 377fbe7

Browse files
committed
update toc
1 parent fa58e6c commit 377fbe7

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed

articles/frontdoor/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -197,6 +197,8 @@
197197
href: /previous-versions/azure/cdn/edgio-retirement-faq?toc=/azure/frontdoor/toc.json
198198
- name: Security
199199
items:
200+
- name: Secure your Front Door
201+
href: secure-front-door.md
200202
- name: Security baseline
201203
href: /security/benchmark/azure/baselines/azure-front-door-security-baseline?toc=/azure/frontdoor/toc.json
202204
- name: DDoS protection

articles/frontdoor/secure-front-door.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Network security for Azure Front Door focuses on establishing secure connections
2626

2727
* **Configure Web Application Firewall for application-layer protection**: Deploy Azure Web Application Firewall (WAF) to protect your applications from common web vulnerabilities and exploits. WAF provides managed rule sets for OWASP Top 10 protection, bot management, and custom rules for specific threat patterns. For more information, see [Web Application Firewall (WAF) on Azure Front Door](./web-application-firewall.md).
2828

29-
* **Implement origin security controls**: Configure your origins to accept traffic only from Azure Front Door by using IP filtering with the AzureFrontDoor.Backend service tag and validating the X-Azure-FDID header value. This prevents attackers from bypassing Front Door's security features. For more information, see [Secure traffic to Azure Front Door origins](./origin-security.md).
29+
* **Implement origin security controls**: Configure your origins to accept traffic only from Azure Front Door by using IP filtering with the `AzureFrontDoor.Backend` service tag and validating the X-Azure-FDID header value. This prevents attackers from bypassing Front Door's security features. For more information, see [Secure traffic to Azure Front Door origins](./origin-security.md).
3030

3131
* **Use rate limiting to prevent abuse**: Configure WAF rate limiting rules to protect against high-volume attacks and prevent individual IP addresses from overwhelming your service. Rate limiting helps mitigate application-layer DDoS attacks and abusive traffic patterns. For more information, see [Rate limiting](/azure/web-application-firewall/afds/waf-front-door-rate-limit).
3232

0 commit comments

Comments
 (0)