From 477ee191057d490d035af1155c800d35ae6b3642 Mon Sep 17 00:00:00 2001 From: asukumar22 <70966383+asukumar22@users.noreply.github.com> Date: Wed, 25 Sep 2024 18:58:31 -0700 Subject: [PATCH 1/2] Added ARG query to A01.30 in afd_checklist.en.json Added ARG query to A01.30 in afd_checklist.en.json --- checklists/afd_checklist.en.json | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/checklists/afd_checklist.en.json b/checklists/afd_checklist.en.json index 7f76ab13c..1aff4e6a4 100644 --- a/checklists/afd_checklist.en.json +++ b/checklists/afd_checklist.en.json @@ -197,6 +197,7 @@ "guid": "49a98f2b-ec22-4a87-9415-6a10b00d6555", "id": "A01.30", "severity": "High", + "graph" : "resources| where type == "microsoft.network/frontdoorwebapplicationfirewallpolicies"| where properties['managedRules']['managedRuleSets'][0]['ruleSetType'] =~ "Microsoft_DefaultRuleSet"| extend compliant = properties['managedRules']['managedRuleSets'][0]['ruleSetType'] =~ "Microsoft_DefaultRuleSet"| distinct id,name,compliant", "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#enable-default-rule-sets" }, { @@ -514,4 +515,4 @@ "waf": "all", "timestamp": "September 23, 2024" } -} \ No newline at end of file +} From dfb42bcceace800fdb1e346906807bb0e8aa9b9d Mon Sep 17 00:00:00 2001 From: asukumar22 <70966383+asukumar22@users.noreply.github.com> Date: Thu, 26 Sep 2024 14:06:34 -0700 Subject: [PATCH 2/2] Added single quotes for strings and case insensitive comparison in A01.30 in afd_checklist.en.json --- checklists/afd_checklist.en.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/checklists/afd_checklist.en.json b/checklists/afd_checklist.en.json index 1aff4e6a4..b0b0aeacf 100644 --- a/checklists/afd_checklist.en.json +++ b/checklists/afd_checklist.en.json @@ -197,7 +197,7 @@ "guid": "49a98f2b-ec22-4a87-9415-6a10b00d6555", "id": "A01.30", "severity": "High", - "graph" : "resources| where type == "microsoft.network/frontdoorwebapplicationfirewallpolicies"| where properties['managedRules']['managedRuleSets'][0]['ruleSetType'] =~ "Microsoft_DefaultRuleSet"| extend compliant = properties['managedRules']['managedRuleSets'][0]['ruleSetType'] =~ "Microsoft_DefaultRuleSet"| distinct id,name,compliant", + "graph" : 'resources| where type =~ 'microsoft.network/frontdoorwebapplicationfirewallpolicies'| where properties['managedRules']['managedRuleSets'][0]['ruleSetType'] =~ 'Microsoft_DefaultRuleSet'| extend compliant = properties['managedRules']['managedRuleSets'][0]['ruleSetType'] =~ 'Microsoft_DefaultRuleSet'| distinct id,name,compliant', "link": "https://learn.microsoft.com/azure/web-application-firewall/afds/waf-front-door-best-practices#enable-default-rule-sets" }, {