Ensure that Request Body Inspection is enabled for the Web Application Firewall (WAF) policy associated with your Azure Application Gateway in order to protect against web attacks such as SQL injection and cross-site scripting hidden within the HTTP request body.
Enabling Request Body Inspection feature for the WAF policy associated with your Azure Application Gateway prevents attacks embedded within the HTTP request body (like SQL Injection or Cross-Site Scripting in POST data) that would bypass inspection of only headers, cookies, or URI. This type of inspection aids in achieving compliance with standards like PCI-DSS and HIPAA, which often require robust application-layer security against web vulnerabilities.
Audit
To determine if Request Body Inspection is enabled for the WAF policy configured for your Azure Application Gateway, perform the following operations:
Remediation / Resolution
To enable Web Application Firewall (WAF) support for your Microsoft Azure Application Gateways, perform the following operations:
References
- Azure Official Documentation
- What is Azure Application Gateway v2?
- What is Azure Web Application Firewall?
- Web Application Firewall request and file upload size limits
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az network application-gateway list
- az network application-gateway show
- az network application-gateway waf-policy show
- az network application-gateway waf-policy update