Loading...

Govern your Azure Firewall configuration with Azure Policies

Govern your Azure Firewall configuration with Azure Policies

Introduction: 

In the rapidly evolving digital landscape, securing cloud environments is more critical than ever. Azure Firewall emerges as a pivotal defense mechanism, offering stateful, cloud-native, and intelligent network firewall security services. It's designed to protect Azure Virtual Network resources and maintain the integrity of cloud workloads. With its high availability and unrestricted cloud scalability, Azure Firewall ensures robust protection against a myriad of cyber threats. 

However, the true strength of Azure Firewall lies not only in its protective capabilities but also in its governability. The configuration of Azure Firewall is a vital aspect that demands meticulous management to ensure that security policies are not only enforced but also aligned with the organization's compliance and governance standards. This is where Azure Policy comes into play, providing a framework to enforce organizational standards and to assess compliance at scale. Its compliance dashboard offers an aggregated view to evaluate the overall environment state, allowing drill-down analysis at the per-resource and per-policy level. 

In this blog, we will unravel how Azure Policy can be leveraged to govern Azure Firewall configurations, ensuring a fortified and compliant network security posture.  

 

Azure Policy for Azure Firewall: 

Azure Policy is a service in Azure that allows you to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements. Azure Policy does this by evaluating your resources for non-compliance with assigned policies. For example, you can have a policy to allow only a certain SKU size of virtual machines in your environment or to enforce a specific tag on resources. 

Azure Policy can be used to govern Azure Firewall configurations by applying policies that define what configurations are allowed or disallowed. This helps ensure that the firewall settings are consistent with organizational compliance requirements and security best practices. 

 

Available Policies for Azure Firewall:  

 

  1. Enable Threat Intelligence in Azure Firewall Policy:  This policy makes sure that any Azure Firewall configuration without threat intel enabled will be marked as non-compliant. 
  2. Deploy Azure Firewall across Multiple Availability Zones: The policy restricts Azure Firewall deployment to be only allowed with Multiple Availability Zone configuration. 
  3. Upgrade Azure Firewall Standard to Premium: This policy recommends the upgradation of Azure Firewall Standard Deployments to Premium so that all the Next Gen Protection firewalls of the Premium SKU can be utilized. This will further enhance the security posture of the environment. 
  4. Azure Firewall Policy Analytics should be enabled: This policy ensures that the Policy Analytics is enabled on the firewall to effectively tune and optimize firewall rules. 
  5. Azure Firewall should only allow Encrypted Traffic: This policy analyses existing rules and ports in azure firewall policy and audits firewall policy to make sure that only encrypted traffic is allowed into the environment. 
  6. Azure Firewall should have DNS Proxy Enabled: This Policy Ensures that DNS proxy feature is enabled on Azure Firewall deployments. 
  7. Enable IDPS in Azure Firewall Premium Policy: This policy ensures that the IDPS feature is enabled on Azure Firewall deployments to effectively protect the environment from various threats and vulnerabilities. 
  8. Enable TLS inspection on Azure Firewall Policy: This policy mandates the enablement of TLS inspection feature to detect, alert, and mitigate malicious activity in HTTPS traffic. 
  9. Migrate from Azure Firewall Classic Rules to Firewall Policy: This policy recommends migrating from Firewall Classic Rules to Firewall Policy. 
  10. VNET with specific tag must have Azure Firewall Deployed: This policy finds all VNETs with a specified Tag and checks if there is an Azure Firewall deployed and flags as non-compliant if no Azure Firewall exists. 

 

Using Azure Policy to Govern Azure Firewall Configuration: The following steps outline the process of creating and assigning a policy definition to a particular Resource Group within Azure. 

 

  • Define the Policy: Start by defining the policy that aligns with your security requirements. This includes specifying the allowed firewall SKUs, required tags, and the necessary rules and settings. Check out the Policy Definition Structure and Aliases from Azure documentation to understand how a custom policy can be built. Additionally, you can leverage the pre-built policy definitions that are available in the Net Sec GitHub Repository to build a custom policy. Moreover, Azure offers built-in policies which are accessible from the Definitions tab in the Policy blade. These policies can be directly assigned to a scope as outlined in the process below. Note that most of the policies from the above-mentioned GitHub repository will soon be integrated as built-in policies within Azure.  

 

Creating a New Policy Definition: The policy depicted in the image below performs an audit on the Azure Firewall Policy deployments in the specified scope. If Threat Intelligence is not enabled the policy marks the audited resource as ‘non-compliant’. This allows the Firewall Administrator to take the necessary action of enabling the required feature to address the compliance issues. Additionally, we can also deploy a policy that blocks any resources which do not match the specified condition.  

 

ShabazShaik_0-1720782722948.png

 

  • Assign the Policy: Once the policy is defined, assign it to the relevant scope, such as a subscription, resource group, or individual resources. This determines where the policy will be enforced. 

 

ShabazShaik_1-1720782722952.png

 

  • Monitor Compliance: Use Azure Policy's compliance data to monitor and ensure that your Azure Firewall configurations remain compliant with the assigned policies. Non-compliant resources can be identified and remediated. 

 

ShabazShaik_2-1720782722955.png

 

  • Audit and Enforce: Policies can be set to audit existing configurations and enforce new configurations, ensuring ongoing compliance and security of your Azure Firewall. 

 

Conclusion: By leveraging Azure Policy in conjunction with Azure Firewall, you can maintain a strong security posture, automate compliance tasks, and ensure that your cloud environment adheres to the necessary regulations and standards. This integration simplifies the governance of your network security and helps protect your resources from potential threats. 

 

 

Published on:

Learn more
Azure Network Security Blog articles
Azure Network Security Blog articles

Azure Network Security Blog articles

Share post:

Related posts

Recovering dropped tables in Azure Databricks with UNDROP TABLE

Oops, Dropped the Wrong Table? What now? We’ve all been there: you’re cleaning up some old stuff in Databricks, run a quick DROP TABLE… and su...

8 hours ago

Azure Developer CLI (azd) – February 2026: JMESPath Queries & Deployment Slots

This post announces the February 2026 release of the Azure Developer CLI (`azd`). The post Azure Developer CLI (azd) – February 2026: JM...

1 day ago

Improved Python (PyPi/uvx) support in Azure MCP Server

Azure MCP Server now offers first-class Python support via PyPI and uvx, making it easier than ever for Python developers to integrate Azure i...

2 days ago

Microsoft Purview: Data Lifecycle Management- Azure PST Import

Azure PST Import is a migration method that enables PST files stored in Azure Blob Storage to be imported directly into Exchange Online mailbo...

6 days ago

Microsoft Rewards: Retirement of Azure AD Account Linking

Microsoft is retiring the Azure AD Account Linking feature for Microsoft Rewards by March 19, 2026. Users can no longer link work accounts to ...

7 days ago

Azure Function to scrape Yahoo data and store it in SharePoint

A couple of weeks ago, I learned about an AI Agent from this Microsoft DevBlogs, which mainly talks about building an AI Agent on top of Copil...

12 days ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy