This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Web Application Firewall"
Jaydeep Dave (talk | contribs) m |
m (Tidying.) |
||
Line 3: | Line 3: | ||
==Description== | ==Description== | ||
− | A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as [[Cross-site Scripting (XSS)]] and [[SQL Injection]]. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified. | + | A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as [[Cross-site Scripting (XSS)|cross-site scripting (XSS)]] and [[SQL Injection|SQL injection]]. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified. |
− | A far more detailed description is available at [http://en.wikipedia.org/wiki/Application_firewall Wikipedia] | + | A far more detailed description is available at [http://en.wikipedia.org/wiki/Application_firewall Wikipedia]. |
− | == | + | ==Important selection criteria== |
− | + | * Protection against OWASP top ten | |
− | + | * Very few false positives (i.e., should NEVER disallow an authorized request) | |
− | * Protection | + | * Strength of default (out-of-the-box) defenses |
− | * Very | + | * Power and ease of learn mode |
− | * Strength of | + | * Types of vulnerabilities it can prevent |
− | * Power and | + | * Detects disclosure and unauthorized content in outbound reply messages, such as credit-card and Social Security numbers |
− | * Types of | + | * Both positive and negative security model support |
− | * Detects disclosure and unauthorized content in outbound reply messages, such as credit-card and Social Security numbers | + | * Simplified and intuitive user interface |
− | * Both | + | * Cluster mode support |
− | * Simplified and | + | * High performance (milliseconds latency) |
− | * Cluster mode support | + | * Complete alerting, forensics, reporting capabilities |
− | * High | + | * Web services\XML support |
− | * Complete | + | * Brute force protection |
− | * Web | + | * Ability to active (block and log), passive (log only) and bypass the web traffic |
− | * Brute | ||
− | * Ability to | ||
* Ability to keep individual users constrained to exactly what they have seen in the current session | * Ability to keep individual users constrained to exactly what they have seen in the current session | ||
− | * Ability to be configured to prevent ANY specific problem ( | + | * Ability to be configured to prevent ANY specific problem (e.g., emergency patches) |
− | * Form | + | * Form factor: software vs. hardware (hardware generally preferred) |
+ | You may also use [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls OWASP Best Practices: Use of Web Application Firewalls] to find out where and when to use a WAF. You may also find the [http://www.webappsec.org/projects/wafec/ Web Application Firewall Evaluation Criteria] useful for evaluating the performance and other characteristics of a WAF. | ||
− | + | The [[London Chapter WAF event]] held in 2006 has some comparative info amongst the WAF vendors that participated in the event. | |
− | |||
− | + | == Tools == | |
− | ==OWASP | + | ===OWASP tools of this type=== |
− | The [http://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project] is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application. | + | * The [http://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project] is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application. |
* [https://www.owasp.org/index.php/OWASP_NAXSI_Project NAXSI] is a WAF for NGINX. | * [https://www.owasp.org/index.php/OWASP_NAXSI_Project NAXSI] is a WAF for NGINX. | ||
− | ==Well | + | ===Well-known open source tools of this type=== |
* [http://www.aqtronix.com/?PageID=99 AQTronix - WebKnight] | * [http://www.aqtronix.com/?PageID=99 AQTronix - WebKnight] | ||
* [http://www.modsecurity.org/ Trustwave SpiderLabs - ModSecurity] | * [http://www.modsecurity.org/ Trustwave SpiderLabs - ModSecurity] | ||
+ | * [https://www.ironbee.com/ Qualys - Ironbee] (A recent new project by Qualys led by Ivan Ristic, the original ModSecurity author) | ||
+ | * [https://github.com/jaydipdave/quickdefencewaf QuickDefence-WAF] (Nginx and Lua based first open source WAF, still in pre-alpha stage) | ||
− | + | ===Commercial tools from OWASP members of this type=== | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | ==Commercial | ||
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services. | These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services. | ||
Line 62: | Line 56: | ||
* [http://www.bayshorenetworks.com/ Bayshore Networks - Application Protection Platform] | * [http://www.bayshorenetworks.com/ Bayshore Networks - Application Protection Platform] | ||
− | ==Other | + | ===Other well-known commercial tools of this type=== |
* [http://www.akamai.com/html/solutions/waf.html Akamai Technologies - Web Application Firewall (WAF)] | * [http://www.akamai.com/html/solutions/waf.html Akamai Technologies - Web Application Firewall (WAF)] | ||
Line 84: | Line 78: | ||
* [http://www.protegrity.com/WebApplicationFirewall Protegrity - Defiance TMS - Web Application Firewall] | * [http://www.protegrity.com/WebApplicationFirewall Protegrity - Defiance TMS - Web Application Firewall] | ||
* [http://www.xtradyne.com/ Xtradyne - Application Firewalls] | * [http://www.xtradyne.com/ Xtradyne - Application Firewalls] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
[[Category: Control]] | [[Category: Control]] | ||
− | [[Category:OWASP WAF]] | + | [[Category: OWASP WAF]] |
Revision as of 16:03, 4 June 2014
This is a countermeasure. To view all countermeasures, please see the Countermeasure Category page.
Description
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.
A far more detailed description is available at Wikipedia.
Important selection criteria
- Protection against OWASP top ten
- Very few false positives (i.e., should NEVER disallow an authorized request)
- Strength of default (out-of-the-box) defenses
- Power and ease of learn mode
- Types of vulnerabilities it can prevent
- Detects disclosure and unauthorized content in outbound reply messages, such as credit-card and Social Security numbers
- Both positive and negative security model support
- Simplified and intuitive user interface
- Cluster mode support
- High performance (milliseconds latency)
- Complete alerting, forensics, reporting capabilities
- Web services\XML support
- Brute force protection
- Ability to active (block and log), passive (log only) and bypass the web traffic
- Ability to keep individual users constrained to exactly what they have seen in the current session
- Ability to be configured to prevent ANY specific problem (e.g., emergency patches)
- Form factor: software vs. hardware (hardware generally preferred)
You may also use OWASP Best Practices: Use of Web Application Firewalls to find out where and when to use a WAF. You may also find the Web Application Firewall Evaluation Criteria useful for evaluating the performance and other characteristics of a WAF.
The London Chapter WAF event held in 2006 has some comparative info amongst the WAF vendors that participated in the event.
Tools
OWASP tools of this type
- The OWASP Stinger Project is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application.
- NAXSI is a WAF for NGINX.
Well-known open source tools of this type
- AQTronix - WebKnight
- Trustwave SpiderLabs - ModSecurity
- Qualys - Ironbee (A recent new project by Qualys led by Ivan Ristic, the original ModSecurity author)
- QuickDefence-WAF (Nginx and Lua based first open source WAF, still in pre-alpha stage)
Commercial tools from OWASP members of this type
These vendors have decided to support OWASP by becoming members. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.
- art of defence - hyperguard
- Trustwave - WebDefend Web Application Firewall
- Fortify Software - Defender
- Imperva - SecureSphere™
- Penta Security - WAPPLES
- Bayshore Networks - Application Protection Platform
Other well-known commercial tools of this type
- Akamai Technologies - Web Application Firewall (WAF)
- DenyAll - Web Application Firewall (WAF)
- Applicure - DotDefender
- Port80 Software - ServerDefender VP
- Radware AppWall
- Armorlogic - Profense
- Barracuda Networks - Application Firewall
- Bee Ware – i-Suite
- BinarySec - Application Firewall
- BugSec - WebSniper
- Cisco - ACE Web Application Firewall
- Citrix - Application Firewall
- eEye Digital Security - SecureIIS
- F5 - Application Security Manager
- Forum Systems - Xwall, Sentry
- mWEbscurity - webApp.secure
- Ergon - Airlock
- Privacyware - ThreatSentry IIS Web Application Firewall
- Protegrity - Defiance TMS - Web Application Firewall
- Xtradyne - Application Firewalls