Axon Shield

Part of the Akamai WAF Defense Guide - Akamai Site Shield protects origin servers. If you configure your firewalls correctly, no traffic can access your applications without being inspected by Akamai's WAF first. It is important to remember that IP ranges of 'your' Site Shield are shared across Akamai customers and evolve over time. For the latter, you need an operational process to maintain firewall rules without creating bypass routes or blocking legitimate Akamai traffic.

Site Shield Operations: Why Origin Protection Requires Continuous IP Range Management

The Origin Protection Mechanism That Requires Perpetual Maintenance

Enterprise security architectures position Web Application Firewalls at network edge. The best is to push WAF outside your dedicated network "cables" as they are part of your limited infrastructure assets. Using Akamai, all internet traffic routes through cloud-based evaluation before reaching your infrastructure.

Security teams optimize the WAF and DoS configuration to ensure the traffic reaching your applications is within the computational limits. Then they discover attackers aren't attempting to defeat the WAF - they're routing around it entirely.

Origin servers with publicly discoverable IP addresses receive direct attack traffic that bypasses edge protection completely. The obvious solution: configure origin firewalls to accept connections exclusively from Akamai infrastructure.

Akamai Site Shield provides exactly this capability. The service publishes IP ranges for Akamai edge nodes. Organizations configure origin firewalls with simple rule: accept traffic from Site Shield IPs, reject everything else.

The implementation appears straightforward. The operational reality is not.

Site Shield IP ranges are shared across Akamai customers. The same IP addresses serving traffic for your organization also serve traffic for competitors, partners, and unrelated third parties. This creates attribution challenges when investigating traffic patterns. The upside is that Akamai can identify potentially malicious parties that would try to exploit this IP range sharing.

Another security aspect worth mentioning - some of the Site Shield maps (IP ranges assigned to you Site Shield configuration) are fairly large and depend on the amount of traffic your applications serve.

Site Shield maps create an operational challenge as well. Site Shield IP ranges evolve continuously as Akamai expands global infrastructure. New edge nodes come online in different geographic regions. Capacity adjustments shift traffic between IP ranges. Network optimization changes routing topology.

Your firewall rules based on last month's IP list become obsolete. Either they block legitimate Akamai traffic (new IPs not yet whitelisted), or they permit direct traffic (removed IPs that should no longer be trusted).

The protection mechanism works perfectly - as long as operational processes maintain configuration synchronization. Organizations lacking these processes discover Site Shield provides temporary protection that degrades over time.

The good news is that Akamai will not change IP ranges without you first confirming you updated your own firewalls. But the need for an operational model is there and your Akamai support and network teams need to work together.


Why IP Ranges Are Shared Across Akamai Customers

Akamai operates global content delivery infrastructure with thousands of edge nodes distributed across hundreds of geographic locations. Efficient operation requires dynamic traffic management and here are some aspects that may require IP range adjustments:

Load balancing across edge nodes - Customer traffic doesn't route to dedicated infrastructure. Akamai distributes load across available capacity. The same edge node serves requests for banking applications, e-commerce platforms, media streaming, and enterprise SaaS.

Geographic optimization - User requests route to nearest edge nodes based on network topology and current load conditions. A user in London might connect to different Akamai IPs across successive requests as routing algorithms optimize for latency and capacity.

Capacity scaling - Traffic surges don't require provisioning dedicated hardware. Akamai shifts capacity allocation across the global network. Your traffic spike might utilize edge nodes primarily serving other customers during normal conditions.

This architecture delivers Akamai's core value proposition: global scale, performance optimization, and DDoS resilience. The trade-off: you cannot predict which specific Akamai IPs will serve your traffic at any given moment.

Security Implications of Shared Infrastructure

Challenge 1: Traffic Attribution

Origin server logs show connections from Akamai IP 203.0.113.47. Is this traffic:

  • Legitimate users accessing your application through Akamai?
  • Akamai's monitoring systems performing health checks?
  • Traffic for different Akamai customer that routed incorrectly?
  • Attack traffic exploiting IP whitelisting?

Without additional context, IP address alone provides insufficient attribution. Organizations need application-layer logging (authentication tokens, session identifiers) to distinguish legitimate from malicious traffic.

Challenge 2: Blast Radius Analysis

Security teams evaluate risk through blast radius assessment: if specific infrastructure is compromised, what is the scope of potential damage?

With dedicated infrastructure, blast radius is bounded. "If this server is compromised, these three applications are at risk."

With shared Akamai IPs, blast radius assessment becomes more complicated. If attackers compromise Akamai edge node infrastructure (unlikely but possible), the affected IP addresses serve hundreds of customers simultaneously.

Your risk exposure depends on Akamai's security posture, not just your own controls. This doesn't make Site Shield ineffective but it needs to be considered. It changes risk calculation from "our infrastructure security" to "Akamai infrastructure security + our configuration management." Having said that, Akamai provides excellent monitoring capabilities within its platform. The challenge here is to efficiently integration operations of your Akamai and network teams.


The IP Range Evolution Problem

Akamai publishes Site Shield IP ranges through multiple channels:

  • Akamai Control Center (manual download)
  • API endpoints (programmatic access)
  • Email notifications (change announcements)

Organizations implement initial firewall configuration based on current IP list. Configuration validates successfully. Traffic flows correctly. Team considers implementation complete.

Six months later: customer complaints about connection failures. Investigation reveals Akamai added new edge nodes in Asia-Pacific region. New IPs serve traffic for users in that geography. Someone from the Akamai ops team have confirmed the change but forgot to mention it to your network team - your firewalls will reject new IP ranges because IPs aren't whitelisted.

Emergency firewall update resolves immediate issue. But the pattern reveals operational gap: IP range updates require ongoing process, not one-time configuration.

How Frequently Do IP Ranges Change?

Akamai doesn't publish change frequency statistics publicly. Based on operational experience across multiple implementations:

Major expansions: Quarterly to semi-annually. New geographic regions, significant capacity additions, infrastructure upgrades that shift traffic to new IP blocks.

Minor adjustments: Monthly. Individual edge nodes added or decommissioned, capacity rebalancing, network optimization shifting traffic distribution.

Emergency changes: Unpredictable. DDoS attack mitigation, infrastructure failures, routing optimization in response to internet-wide events.

The variance makes static firewall rules untenable. Organizations need monitoring and update mechanisms.

The Operational Debt of Manual IP Management

Process without automation:

  1. Akamai announces IP range update via email
  2. Email reaches infrastructure team (if monitoring distribution list)
  3. Team evaluates changes, determines impact
  4. Firewall change request submitted
  5. Change control review and approval
  6. Implementation scheduled during maintenance window
  7. Firewall rules updated manually
  8. Validation testing confirms connectivity

Timeline: 5-14 days depending on change control procedures.

Risk window: Between announcement and implementation, new Akamai IPs serve traffic that origin firewalls block.

At enterprise scale with change control procedures designed to prevent misconfigurations, rapid firewall updates conflict with process discipline. Organizations choose between:

Option A: Relaxed firewall rules (permit broader IP ranges including future Akamai expansion)
Trade-off: Reduced protection against direct origin attacks

Option B: Strict rules requiring frequent updates
Trade-off: Operational overhead and potential service disruptions during updates

Neither option is ideal. Automation becomes necessary.


The Automation Architecture That Actually Works

Seamless Site Shield operation is based on programmatic IP range management:

Component 1: Automated IP Range Retrieval

Akamai provides API endpoints for Site Shield IP retrieval1:

GET /siteshield/v1/maps/{mapId}

Response includes:

  • Current IP ranges (active edge nodes)
  • Proposed IP ranges (upcoming changes with effective dates)
  • Acknowledgment requirements (confirmation that updates were received)

Implementation approach:

Daily scheduled job queries API, compares response to current firewall configuration, identifies discrepancies. This provides advance warning before Akamai activates new IPs.

Critical requirement: Must acknowledge proposed changes through API. If acknowledgment doesn't occur, Akamai assumes configuration update failed and may defer activation to prevent service disruption.

The process becomes complex if changes must be logged in a change management system - this is another API / process that creates additional gates complicating your automation.

This acknowledgment mechanism prevents automatic updates without validation. Organizations must explicitly confirm readiness before Akamai shifts traffic to new IPs.

Component 2: Firewall Configuration Management

Retrieving IP updates solves half the problem. Implementing firewall changes requires:

Infrastructure-as-Code approach:

  • Firewall rules defined in version-controlled configuration
  • Changes submitted through pull request workflow
  • Automated validation ensures syntax correctness
  • Approval process required before merge
  • Deployment automation applies changes to production firewalls

Advantages over manual updates:

  • Change history tracked in version control
  • Rollback capability if updates cause issues
  • Peer review of changes before production deployment
  • Consistent configuration across multiple firewall instances

Example implementation: We implemented Terraform-managed firewall rules with Site Shield IPs defined as variables. Daily automation retrieved latest IP ranges from Akamai API, compared to current Terraform state, generated pull requests for discrepancies.

Security team reviewed proposed changes (typically weekly), approved updates, automated deployment applied configuration across all origin firewalls.

Operational improvement: IP range updates that previously required 5-14 days now completed in 24-48 hours with reduced manual effort.

Component 3: Validation and Monitoring

Firewall configuration changes can introduce connectivity failures:

Validation requirements:

  • Connectivity testing from Akamai IPs confirms traffic accepted
  • Application health checks verify services remain accessible
  • Monitoring confirms no error rate increase post-deployment
  • Rollback procedures ready if validation fails

Monitoring that detects configuration drift:

  • Alert when origin servers receive connections from non-whitelisted IPs (bypass attempt or missing Akamai IP)
  • Alert when Akamai connections are rejected (IP range update not yet deployed)
  • Weekly reconciliation comparing Akamai's current IP list to deployed firewall rules

The monitoring serves two purposes: detect security bypasses (unexpected IPs), and detect configuration gaps (missing legitimate IPs).


Multi-Application Server Coordination Challenges

Enterprise environments rarely have single origin server. More common: dozens of application servers, multiple load balancers, distributed across geographic regions.

Site Shield IP updates must synchronize across:

  • All origin application servers
  • Cloud provider security groups (AWS, Azure, GCP)
  • Network firewalls
  • Load balancer ACLs
  • Web server configurations (Apache, Nginx allow/deny rules)

Failure scenario at financial institution:

Updated firewall rules on primary datacenter infrastructure. Forgot to update secondary datacenter used for disaster recovery. During routine DR testing, traffic failed to secondary site because Akamai IPs were blocked.

DR test revealed configuration drift that could have caused production outage during actual incident.

Remediation:

  • Centralized firewall rule management (single source of truth)
  • Automated deployment to all locations simultaneously
  • Post-deployment validation across all environments
  • Quarterly DR testing to validate configuration consistency

The complexity scales with infrastructure size. Organizations with distributed global infrastructure need orchestration across regions, cloud providers, and network layers.


The Third-Party Integration Complication

Site Shield protects your origin servers from direct internet traffic. It doesn't protect against third-party services that legitimately need origin access:

Common integration requirements:

Monitoring services - External uptime monitors, performance testing services, security scanners. These tools connect directly to origin to measure response without Akamai caching influence.

Payment processors - PCI-DSS requirements may mandate direct origin communication for certain transaction types.

Partner integrations - B2B partners with server-to-server connections that bypass edge infrastructure for latency optimization.

Administrative access - DevOps teams, incident response procedures, troubleshooting scenarios requiring direct origin connectivity.

Each legitimate exception creates firewall rule complexity:

Accept: Traffic from Akamai Site Shield IPs
Accept: Traffic from monitoring service (203.0.113.100-203.0.113.110)  
Accept: Traffic from payment processor (198.51.100.0/24)
Accept: Traffic from Partner A (192.0.2.47)
Accept: Traffic from Partner B (192.0.2.89)
Accept: Traffic from corporate VPN (10.0.0.0/8)
Reject: All other traffic

As exception list grows, configuration management becomes increasingly critical. Each exception represents potential security risk if the third-party infrastructure is compromised.

Best practice: Document business justification for every exception. Quarterly review determines if exceptions remain necessary. Remove obsolete rules proactively.

At the bank: Discovered 23 firewall exceptions for services no longer in use. Partners had migrated infrastructure, monitoring services were decommissioned, development environments shut down - but firewall rules persisted because removal required security review nobody initiated.


Why "Just Accept All Akamai IPs" Fails

The obvious simplification: configure firewalls to accept all Akamai infrastructure (not just Site Shield ranges). This eliminates IP range update coordination.

Akamai operates significantly more infrastructure than Site Shield requires. Published IP ranges include:

  • Site Shield (origin protection)
  • General edge infrastructure (standard CDN)
  • Prolexic (DDoS mitigation)
  • Media delivery networks
  • Development and testing infrastructure

Accepting all Akamai IPs means:

  • Your origin accepts connections from infrastructure serving other customers
  • Attack surface expands beyond necessary scope
  • Blast radius increases if any Akamai infrastructure is compromised
  • Lose attribution capability (cannot distinguish which Akamai service originated traffic)

The principle: Minimize attack surface by accepting only infrastructure specifically allocated for your traffic (Site Shield). Broader acceptance trades security for operational simplicity.

Some organizations make this trade-off consciously. It's not inherently wrong, but it should be deliberate decision with understood risk implications.


What We Implemented at the Financial Institution

Initial state: Site Shield configured during initial Akamai deployment. Firewall rules manually created based on IP ranges from that date. No update process. Configuration drift accumulated for 14 months.

Transformation deliverables:

API-driven IP retrieval - Daily automated queries to Akamai Site Shield API. Comparison of proposed changes to current configuration. Advance notification before Akamai activates new IPs.

Infrastructure-as-Code firewall management in AWS - Terraform-managed rules with version control. Peer review of changes. Automated deployment to all environments.

Multi-environment synchronization - Semi-manual process - due to the complexity of change management, on-prem firewall updates were only partially automated - changes depending on change request approvals.

Exception documentation - Catalogued all third-party firewall exceptions with business justification. Quarterly review process to remove obsolete rules.

Timeline: 6 weeks from design to production deployment.

Operational improvement: IP range updates that previously took 5-14 days now complete in 24-48 hours. Configuration drift detection catches issues proactively instead of during incident response.

The origin protection mechanism stopped being operational burden and became reliable security control.


Related Resources


References

  1. Akamai Technologies. (2024). "Site Shield API Documentation." Akamai TechDocs. https://techdocs.akamai.com/site-shield/reference/api
  2. Akamai Technologies. (2024). "Site Shield Implementation Guide." Akamai Product Documentation. https://techdocs.akamai.com/site-shield/docs
  3. NIST. (2023). "Guide to Firewall Technologies and Policy." NIST Special Publication 800-41 Revision 1.
  4. HashiCorp. (2024). "Terraform AWS Security Group Resources." Terraform Registry Documentation.
  5. Cloud Security Alliance. (2023). "Security Guidance for Cloud Computing." CSA Industry Guidance.
  6. OWASP Foundation. (2021). "Attack Surface Analysis Cheat Sheet." OWASP Cheat Sheet Series.
  7. Akamai Technologies. (2024). "Akamai Connected Cloud IP Ranges." Akamai Support Documentation.
  8. Scarfone, K., & Hoffman, P. (2009). "Guidelines on Firewalls and Firewall Policy." NIST Special Publication 800-41 Revision 1.
  9. Ansible. (2024). "Network Automation Documentation." Red Hat Ansible Documentation.
  10. Center for Internet Security. (2023). "CIS Controls Version 8." CIS Security Best Practices.