Enhance Cybersecurity with Azion's Advanced WAAP Solution
Azion’s Web Application and API Protection (WAAP) ensures robust defense mechanisms against cyber threats such as OWASP Top 10, sophisticated zero-day attacks, and automated bot activities. This architecture guarantees the security and uninterrupted availability of web applications and APIs by employing a comprehensive suite of integrated security features that meticulously analyze and manage incoming requests to protect against a wide range of attacks.
This solution is ideal for organizations looking to safeguard their digital infrastructure against advanced security threats, providing reliable protection for web applications and APIs against the most challenging cyber attacks.
Web Application and API Protection (WAAP) Architecture Diagram
Web Application and API Protection (WAAP) Dataflow
- A request reaches Azion Web Platform and is redirected to Firewall.
- Firewall processes the request, where DDoS Protection assesses for potential DDoS or DoS attacks, blocking or allowing the request accordingly.
- Firewall’s Rules Engine processes the rules during the request phase; if conditions are met, the corresponding behaviors are executed.
- Rules Engine finalizes execution and sends a response if:
- Network Shield identifies the user or network as a potential threat and applies configured behaviors such as blocking or penalties.
- WAF detects a security threat.
- Bot Manager classifies the device, user, or intent as malicious.
- Security Functions or custom rules, such as rate limiting, deny access or take other preventive actions to protect the application.
- Rules Engine permits the request to proceed to Application.
- Application’s Rules Engine forwards the request to the Origin—whether it be multi-cloud, on-premises, or hybrid—and, upon receiving the response, initiates the Rules Engine’s response phases.
- The client receives the final response.
Components
- Firewall: provides main settings to set up your instance and associate it with domains and activate modules.
- DDoS Protection: detects and mitigates DDoS and DoS attacks when it’s activated.
- Web Application Firewall: allows you to configure protection against attacks and vulnerabilities found in OWASP Top 10 and block requests.
- Network Shield: allows you to create lists with IP addresses or countries with suspicious behavior and restrict their access.
- Bot Manager: identifies and classifies the request according to the intent-based behavioral analysis.
- Applications: runs your application on top of the Azion Web Platform.
Implementation
-
Create an application using one of the recommended options:
- Dynamic and Static File Optimization template. To easily deploy this template at the edge, click the button below:
-
Create a firewall and associate it with the configured domain, so all security rules apply to that specific domain.
- Enable the DDoS Protection module.
- Enable the Web Application Firewall module.
- Enable the Network Shield module.
-
- Configure Threat Type and Sensitivity levels.
-
Create a network list in Network Shield.
- Configure the IPs or countries that’ll be blocked.
-
- Contact the Sales team for more details on the Bot Manager subscription.
- Configure Bot Manager Lite if you’ve decided to use this version.
-
Create rules in Rules Engine for Firewall.
- Configure the Set WAF Rule Set behavior.
- Configure the Network criteria.
- Configure the Request URI criteria.
Related docs
- Use Azion Observe products to monitor your application delivery, incoming traffic, and how your security logics are being applied and with which requests.