module/ConfigurationProvider/ControlConfigurations/Services/LoadBalancer.json

{
  "FeatureName": "LoadBalancer",
  "Reference": "aka.ms/azsktcp/loadBalancer",
  "IsMaintenanceMode": false,
  "Controls": [
    {
      "ControlID": "Azure_LoadBalancer_NetSec_Enable_WAF_And_DDoS_Protection_Trial",
      "Description": "[Trial] Load Balancer should have Web Application Firewall (WAF) and DDoS configured",
      "Id": "LoadBalancer110",
      "ControlSeverity": "Medium",
      "Automated": "Yes",
      "MethodName": "CheckLoadBalancerWAFTrial",
      "DisplayName": "[Trial] Load Balancer should have Web Application Firewall (WAF) and DDoS configured",
      "Rationale": "WAF enforcement on the Load Balancer further strengthens the security posture of your applications by protecting them from the common web vulnerabilities. This allows you to secure both your internet-facing as well as your internal application workloads. Enabling DDOS on Vnet of front end configurations, provides protection and defense for Azure resources against the impacts of DDoS attacks.",
      "Recommendation": "To Remediate WAF on Load balancer, Enable DDOS on the Virtual Network of every frontend IP configuration of Load balancer and attach every subnet with NSG/Azure Firewall.",
      "Tags": [
        "Baseline",
        "Daily"
      ],
      "Enabled": true,
      "CustomTags": [
        "Trial"
      ]
    }
  ]
}