WAF Rule Sets

Web Application Firewall (WAF) provides the creation of rule sets to protect your edge applications against threat families.

Each threat receives a score and it’s processed according to the sensitivity level set. If there’s more than one case for the same threat type, the score will increase.

After creating a rule set, you also need to create a rule in Rules Engine for Edge Firewall to execute the criteria and behavior.

ScopeSource
Rule setHow to create a WAF rule set

The Threat Type Configuration table is available in the Main Settings tab of a WAF configuration. Threats are categorized into families, according to the purpose of the attack.

Threat familyDescription
SQL InjectionDetects attack attempts by injecting SQL code into the application
Remote File Inclusions (RFI)Detects attempts to include files, usually through scripts on the web server
Directory TraversalPrevents exploitation of vulnerability regarding insufficient sanitization of file name fields provided by users, so that characters representing shortcuts to the parent directory are passed through the file API
Cross-Site Scripting (XSS)Prevents the injection of client-side scripts into pages viewed by your visitors
File UploadDetects the attempt to upload files to the web server
Evading TricksProtects against some coding tricks used to try to evade protective mechanisms
Unwanted AccessDetects attempts to access administrative or vulnerable pages, bots, and security scanning tools
Identified AttackPrevents several types of common attacks and known vulnerabilities that should certainly be blocked

A request will be blocked by WAF if it obtains a score greater than or equal to the configured sensitivity level threshold. You can set one sensitivity level for each threat family.

SensitivityDescription and WAF sore threshold
LowestThe request will be considered a threat if it presents very strong evidence and receives a score equal to or greater than 40. This sensitivity has a lower level of protection for your applications, but it’ll also avoid blocking requests with less chance of false positives
LowThe request will be considered a threat if it presents very strong evidence and receives a score equal to or greater than 24. This sensitivity has a lower level of protection for your applications, but it’ll also avoid blocking requests with less chance of false positives
MediumRecommended sensitivity level. The request will be considered a threat if it presents sufficient evidence and receives a score equal to or greater than 16
HighAt the slightest hint of a threat, the requisition may be blocked, even when it has a score equal to or greater than 8. This level of sensitivity may present more false positives if the learning stage doesn’t have sufficient coverage of the variability of scenarios and uses of its application
HighestAt the slightest hint of a threat, the requisition may be blocked, even when it has a score equal to or greater than 4. This level of sensitivity may present more false positives if the learning stage doesn’t have sufficient coverage of the variability of scenarios and uses of its application

After configuring WAF’s main settings with the Threat Type Configuration table, you must create a Rules Engine for Edge Firewall rule to execute the behavior you’ve configured.

This configuration guarantees your WAF settings are implemented along with other Edge Firewall security logic.

go to create a rule guide

Threat monitoring with Real-Time Metrics

Section titled Threat monitoring with Real-Time Metrics

Once you’ve completed your WAF rule set configuration and your edge application is receiving incoming traffic, you can use Real-Time Metrics to monitor requests and threats. You’ll find charts comparing how WAF processed requests and a few specific charts for different threat families.

go to real-time metrics reference

You can also conduct further analysis regarding WAF threats via Data Stream and Real-Time Events.

Watch a video tutorial about WAF Rule Sets on Azion’s YouTube channel:


Contributors