appservice-landing-zone-accelerator

Multitenant App Service Secure Baseline

This reference architecture shows how to run a web-app workload on Azure App Services in a secure configuration. This secure baseline follow Defence in Depth approach to protect AppService workload against cloud vulnerabilities along with additional Well-Architected Framework pillars to enable a resilient solution.

Architecture

image

Core architecture components

Networking

Network design topology is based on Hub and Spoke that allows to govern, secure and route traffic in a granular mode.

Private endpoints are used throughout this architecture to improve security. While private endpoints don’t directly improve, or reduce, the availability of this solution, they allow important security principles to be applied. For more information about security design principles, see Azure well architected framework - Security pillar.

Network segmentation boundaries are established along public and private lines. Azure Front Door and Azure App Service are designed to operate on the public internet. These services have their public endpoints enabled. However, App Service has access restrictions in place to ensure that only traffic allowed by Front Door WAF (Web Application Firewall) is allowed to ingress into the App Service.

Azure services that don’t require access from the public internet have private endpoints enabled and public endpoints disabled. The Azure data services SQL DB, SQL DB and Azure Cache for Redis all have public endpoints disabled. Each private endpoint is deployed into one subnet that is dedicate to integrated private link services. Azure service firewalls are used to only allow traffic from other authorized Azure services. Private DNS zones are linked to each private endpoint, via private DNS zone groups and virtual network links, to ensure that private link DNS records are automatically created and updated.

For network and subnet topology details, see the Azure sample template for this architecture.

Alternatives

Scenario details

The scenario describes a secure baseline that allows you to have a protect environment and a good starting point for designing your solution. Defence in depth is a security strategy that involves implementing multiple layers of defence at different points within a network or system. The idea is that if one layer of defence is breached, the next layer will be able to prevent an attacker from gaining access to sensitive information or critical systems. This approach is a key point that drives the architecture decisions ->

Potential use cases

Recommendations

Front Door

Azure Front Door is a global service, always available across all Azure geographies and resilient to zone-wide outages and region-wide outages.

Check out Defender for App Service for secure and detect operations to protect your Azure App Service web apps and APIs.

SQL Database

For more recommendations and information, see Azure SQL Security Baseline

Cache for Redis

For more recommendations and information, see Azure Redis Cache Security Baseline

Deploy this scenario

Deploy this reference architecture using this Azure sample on GitHub.

Considerations for Azure Government cloud

Azure Front Door Premium is not available in Azure Government cloud. The reference implementation will deploy an Azure Application Gateway instead.

Next

Pick one of the IaC options below and follow the instructions to deploy the App Service reference implementation.

:arrow_forward: Terraform

:arrow_forward: Bicep