Government agencies tend to be at a very high risk of DDoS attacks, as they constitute a high-profile target. The IT team of one European government office, therefore, decided to evaluate the effectiveness of its protection measures in relation to DDoS attacks.
The protection architecture used the Azure DDoS IP Protection Plan. The setup involves a DNS resolving user API requests and then routing them to the application gateway and WAF, where they are inspected and filtered. Requests that are not blocked are forwarded to the cloud environment, where an API Management system enforces a custom rate-limiting rule. Permitted requests then proceed to a firewall that blocks all traffic by default, with only explicitly defined ports open. Requests for the ECHO API are then resolved by the API service and requests for a specialized in-house API are routed to an on-premises data center through a VPN for handling by an associated API service.
We designed and executed a comprehensive DDoS simulation to assess the efficiency and resilience of the agency’s protective measures. To rigorously challenge Azure’s Web Application Firewall (WAF) and DDoS IP Protection Plan, we launched seven distinct attack scenarios using a globally distributed botnet of 400 bots. These scenarios included both network layer and application layer vectors, ranging from common to advanced techniques.
The simulation was tailored to reflect the organization’s current infrastructure, known threat landscape, and risk profile. The goal was to validate protection controls, identify weak spots, and test incident response – namely, the ability to detect and mitigate real-world threats.
Of the seven attack scenarios, three were detected and mitigated. One was only partially mitigated and three were not mitigated at all, resulting in service disruptions that affected the agency’s internet-based services. While Azure’s protection services provided a baseline level of defense, our testing revealed several weak points, particularly in detection latency, configuration gaps, and the handling of complex application-layer attacks.
Azure rate limit rules did not work during the simulation, resulting in zero mitigation of attacks targeting the API services. In addition, the DDoS Protection Plan, which should respond to layer 3/4 attacks, did not detect or mitigate a TLS Reconnections attack.
The Red Button team recommended the following measures to improve the government agency’s resilience to DDoS attacks.
Check out these resources for more information
about our DDoS testing solutons for your business.