This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Web Application Firewall"
(→Important selection criteria) |
(→Tools) |
||
Line 13: | Line 13: | ||
== Tools == | == Tools == | ||
− | ===OWASP | + | ===OWASP projects of this type=== |
− | * | + | * [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project] |
* [https://www.owasp.org/index.php/OWASP_NAXSI_Project NAXSI] is a WAF for NGINX. | * [https://www.owasp.org/index.php/OWASP_NAXSI_Project NAXSI] is a WAF for NGINX. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
[[Category: Control]] | [[Category: Control]] | ||
[[Category: OWASP WAF]] | [[Category: OWASP WAF]] |
Revision as of 15:23, 21 May 2015
This is a countermeasure. To view all countermeasures, please see the Countermeasure Category page.
Description
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.
A far more detailed description is available at Wikipedia.
Important selection criteria
For more information on web application firewall evaluation criteria, please visit Web Application Firewall Evaluation Criteria.