Skip to content

Latest commit

 

History

History
27 lines (23 loc) · 2.26 KB

detect-insecure-custom-origin.md

File metadata and controls

27 lines (23 loc) · 2.26 KB

CloudSploit

AZURE / CDN Profiles / Detect Insecure Custom Origin

Quick Info

Plugin Title Detect Insecure Custom Origin
Cloud AZURE
Category CDN Profiles
Description Ensures that HTTPS is enabled for CDN endpoints with a custom origin
More Info All Azure CDN endpoints should enable HTTPS to secure traffic to the backend custom origin.
AZURE Link https://docs.microsoft.com/en-us/azure/cdn/cdn-create-endpoint-how-to
Recommended Action Enable HTTPS and disable HTTP for each custom origin endpoint for each CDN profile.

Detailed Remediation Steps

  1. Log into the Microsoft Azure Management Console.
  2. Select the "Search resources, services, and docs" option at the top and search for CDN. Select "Front Door and CDN profiles".
  3. On the "Front Door and CDN profiles" page, click on the "Name" link to access the configuration changes.
  4. In the CDN details pane that opens, click on the "Endpoints" link under "Properties".
  5. On the endpoint management page that opens, click on "default-route" under "Routes" column to load the route configuration page.
  6. On the "Update route" page, check the value of "Accepted protocols" dropdown. If it is set to "HTTP only" or "HTTP and HTTPS" then the endpoint allows insecure traffic. This is a security threat.
  7. Click on the "Accepted protocols" dropdown and select "HTTPS only". This will configure the endpoint to accept only secure traffic.
  8. Ensure that the checkbox for "Redirect" is selected to "Redirect all traffic to use HTTPS".
  9. Click "Update" at the bottom of the page to save the changes.
  10. Repeat steps 4 - 9 for all other CDN endpoints.