You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/mitigate-owasp-api-threats.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,7 +121,7 @@ More information about this threat: [API4:2019 Lack of resources and rate limiti
121
121
122
122
* Limit the number of parallel backend connections with the [limit concurrency](api-management-advanced-policies.md#LimitConcurrency) policy.
123
123
124
-
* While API Management can protect backend services from DDoS attacks, it may be vulnerable to those attacks itself. Deploy a bot protection service in front of API Management (for example, [Azure Application Gateway](api-management-howto-integrate-internal-vnet-appgateway.md), [Azure Front Door](../frontdoor/front-door-overview.md), or [Azure DDoS Protection Service](../ddos-protection/ddos-protection-overview.md)) to better protect against DDoS attacks. When using a WAF with Azure Application Gateway or Azure Front Door, consider using [Microsoft_BotManagerRuleSet_1.0](../web-application-firewall/afds/afds-overview.md#bot-protection-rule-set).
124
+
* While API Management can protect backend services from DDoS attacks, it may be vulnerable to those attacks itself. Deploy a bot protection service in front of API Management (for example, [Azure Application Gateway](api-management-howto-integrate-internal-vnet-appgateway.md), [Azure Front Door](front-door-api-management.md), or [Azure DDoS Protection](protect-with-ddos-protection.md)) to better protect against DDoS attacks. When using a WAF with Azure Application Gateway or Azure Front Door, consider using [Microsoft_BotManagerRuleSet_1.0](../web-application-firewall/afds/afds-overview.md#bot-protection-rule-set).
125
125
126
126
## Broken function level authorization
127
127
@@ -237,7 +237,7 @@ More information about this threat: [API8:2019 Injection](https://github.com/OWA
237
237
238
238
### Recommendations
239
239
240
-
*[Modern Web Application Firewall (WAF) policies](https://github.com/SpiderLabs/ModSecurity) cover many common injection vulnerabilities. While API Management doesn’t have a built-in WAF component, deploying a WAF upstream (in front) of the API Management instance is strongly recommended. For example, use [Azure Application Gateway](/azure/architecture/reference-architectures/apis/protect-apis) or [Azure Front Door](../frontdoor/front-door-overview.md).
240
+
*[Modern Web Application Firewall (WAF) policies](https://github.com/SpiderLabs/ModSecurity) cover many common injection vulnerabilities. While API Management doesn’t have a built-in WAF component, deploying a WAF upstream (in front) of the API Management instance is strongly recommended. For example, use [Azure Application Gateway](/azure/architecture/reference-architectures/apis/protect-apis) or [Azure Front Door](front-door-api-management.md).
241
241
242
242
> [!IMPORTANT]
243
243
> Ensure that a bad actor can't bypass the gateway hosting the WAF and connect directly to the API Management gateway or backend API itself. Possible mitigations include: [network ACLs](../virtual-network/network-security-groups-overview.md), using API Management policy to [restrict inbound traffic by client IP](api-management-access-restriction-policies.md#RestrictCallerIPs), removing public access where not required, and [client certificate authentication](api-management-howto-mutual-certificates-for-clients.md) (also known as mutual TLS or mTLS).
Copy file name to clipboardExpand all lines: articles/api-management/protect-with-ddos-protection.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article shows how to defend your Azure API Management instance against dist
17
17
18
18
## Supported configurations
19
19
20
-
Enabling Azure DDoS Protection for API Management is available only for instances deployed (injected) in a VNet in [external mode](api-management-using-with-vnet.md).
20
+
Enabling Azure DDoS Protection for API Management is currently available only for instances deployed (injected) in a VNet in [external mode](api-management-using-with-vnet.md).
21
21
22
22
Currently, Azure DDoS Protection can't be enabled for the following API Management configurations:
23
23
@@ -40,20 +40,20 @@ Currently, Azure DDoS Protection can't be enabled for the following API Manageme
40
40
41
41
## Enable DDoS Protection
42
42
43
-
Depending on the DDoS Protection plan you use, you enable DDoS protection either on the virtual network used for your API Management instance, or the IP address resource configured for your virtual network.
43
+
Depending on the DDoS Protection plan you use, enable DDoS protection on the virtual network used for your API Management instance, or the IP address resource configured for your virtual network.
44
44
45
45
### Enable DDoS Protection on the virtual network used for your API Management instance
46
46
47
47
1. In the [Azure portal](https://portal.azure.com), navigate to the VNet where your API Management is injected.
48
48
1. In the left menu, under **Settings**, select **DDoS protection**.
49
-
1. Select **Enable**, and then select your Azure DDoS Protection plan.
49
+
1. Select **Enable**, and then select your **DDoS protection plan**.
50
50
1. Select **Save**.
51
51
52
52
:::image type="content" source="media/protect-with-ddos-protection/enable-ddos-protection.png" alt-text="Screenshot of enabling a DDoS Protection plan on a VNet in the Azure portal.":::
53
53
54
54
### Enable DDoS protection on the API Management public IP address
55
55
56
-
To enable DDoS protection on the IP address, see [Enable DDoS IP Protection for a public IP address](../ddos-protection/manage-ddos-protection-powershell-ip.md#disable-ddos-ip-protection-for-an-existing-public-ip-address).
56
+
If your plan uses the IP DDoS Protection SKU, see [Enable DDoS IP Protection for a public IP address](../ddos-protection/manage-ddos-protection-powershell-ip.md#disable-ddos-ip-protection-for-an-existing-public-ip-address).
0 commit comments