0
0
GCPcloud~30 mins

Cloud Armor for DDoS and WAF in GCP - Mini Project: Build & Apply

Choose your learning style9 modes available
Cloud Armor for DDoS and WAF
📖 Scenario: You are managing a website hosted on Google Cloud Platform (GCP). You want to protect your website from attacks like Distributed Denial of Service (DDoS) and block malicious traffic using a Web Application Firewall (WAF).Google Cloud Armor helps you create security policies to protect your site.
🎯 Goal: Build a Google Cloud Armor security policy that blocks traffic from a specific IP address and enables a basic WAF rule to protect your website.
📋 What You'll Learn
Create a Cloud Armor security policy named my-security-policy
Add a rule to block traffic from IP address 203.0.113.5
Add a WAF rule to enable the OWASP_CRS rule set with default action deny
Attach the security policy to a backend service named my-backend-service
💡 Why This Matters
🌍 Real World
Protecting websites and applications from malicious traffic and attacks is critical for uptime and security. Cloud Armor provides scalable protection on Google Cloud.
💼 Career
Cloud security engineers and cloud architects use Cloud Armor to secure services and meet compliance requirements.
Progress0 / 4 steps
1
Create the initial Cloud Armor security policy
Create a Cloud Armor security policy named my-security-policy using the gcloud command line.
GCP
Need a hint?

Use the gcloud compute security-policies create command with the name my-security-policy.

2
Add a rule to block traffic from a specific IP address
Add a rule to the my-security-policy that blocks traffic from IP address 203.0.113.5 with priority 1000.
GCP
Need a hint?

Use gcloud compute security-policies rules create with priority 1000, the IP match expression, and deny action.

3
Add a WAF rule set to the security policy
Add a WAF rule set to my-security-policy enabling the OWASP_CRS rule set with default action deny and priority 2000.
GCP
Need a hint?

Use gcloud compute security-policies rules create with priority 2000, --expression="evaluatePreconfiguredWAF('OWASP_CRS')", and --action="deny(403)".

4
Attach the security policy to the backend service
Attach the my-security-policy to the backend service named my-backend-service using the gcloud command.
GCP
Need a hint?

Use gcloud compute backend-services update my-backend-service --security-policy=my-security-policy --global to attach the policy.