Azure: Are there best practices for intrusion dectection alerts?

Frank Schullerer 141 Reputation points
2022-08-24T11:57:13.593+00:00

Hey,

we are trying to find best practices for our alert-management in Azure. We have a next generation Azure firewall/Application Gateway/WAF and the OWASP rules activated.
Now we are trying to create "good" alerts to notify us. Does anybody have a set of rules they can share e.g. alert by 100 blocked requests/minute?

Thanks in advance!

Frank

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
578 questions
Azure Web Application Firewall
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. David Broggy 5,686 Reputation points MVP
    2022-08-24T16:48:41.277+00:00

    Hi Frank,
    I have some guidelines, but I prefer making my rules to match the required conditions for a given web site...

    Guidelines:

    • understand the web site(s) your protecting
    • identify vulnerable access points such as login pages (any page where data can be entered), and create detections for those specific links.
    • consider some 'deception links' - i.e. if anyone tries to access these links, generate an alert for early warning (then block those source IPs)
    • worry less about static pages that have nothing that can be exploited.

    Here are some common use cases for waf:

    • Count of DISTINCT alert names per destination - my usual threshold for this is 3 or more per hour.
    • Unsupported user-agents - alert on any user-agents except the regular browser types.
    • Periodically review the OWASP top threats and ensure you have detections enabled for these, if possible.
    • log your WAF events to Sentinel and use threat intelligence feeds to alert if matched.
    • Use Sentinel to easily create scan/rate based detections - eg. high rate of login denies from 1 or more sources.
    • Enable all of the waf detections provided by Sentinel - see screenshot.

    Good luck!

    234623-image.png

    0 comments No comments