Azure app service and network security
Azure App Service Environments are expensive. You do get true network isolation and dedicated instances in which you can place behind custom WAF appliances. However, in many cases, many organizations can save on costs by using multi-tenant Azure app services. Multi-tenant app services are fairly inexpensive and often times can be less than the cost of a dedicated VM running IIS.
Because App Services are multi-tenant, they don’t actually get deployed inside of a VNet. But, Application Gateways do support multi-tenant backends like Azure App Services. These app gateways serve act as a reverse proxy, provide SSL termination in one place, and give basic WAF functionality (if you so choose).
Once traffic is able to reach your Azure App Service from an App Gateway, you can also restrict access to that app service from only traffic coming from the Application Gateway. You can do this in two ways: white-listing the IP of the Application Gateway, or allowing traffic only coming from the Application Gateway subnet (preferred). For the latter approach, you’ll also have to create a service endpoint on the VNet to be able to allow VNet traffic to the multi-tenant Azure App Service.
Lastly, if the Azure App Service needs to reach out to private resources inside of a VNet, such as services running on VMs, then you’ll need to add Virtual Network Integration to the App Service. Recently, Azure announced a new type of integration that doesn’t require a point-site VPN and therefore get charged for a virtual network gateway.
In a following posts, I’ll create a sample project demonstrating this.