What do you do if you need to protect your website from XSS attacks? Most people patch it and get a WAF.
This is common knowledge and there are plenty of places where you could go to get basic protection for your websites. From a free solution to solutions costing hundreds of thousands of dollars, most of them will claim they protect from OWASP Top 10 threats. So is there a real difference between WAFs?
The answer is yes. That’s good because most people are unhappy with their legacy WAF solution.
Most generic and inexpensive WAF solutions are based on ModSecurity, an open-source WAF released under Apache license 2.0. ModSecurity was first developed in 2002 to monitor application traffic on the Apache HTTP Server.
To detect generic vulnerabilities, ModSecurity relies on an open-source set of rules called OWASP ModSecurity Core Rule Set. The project is part of the Open Web Application Security Project (OWASP). Granted, several other rule sets are also available.
ModSecurity takes thousands of signatures or patterns provided in the rulesets and applies simple string matching and/or regular expression checks to detect some common types of vulnerabilities, such as XSS or SQLi. Unfortunately, these thousands of regular expressions require regular and manual upkeep both when new expressions need to be added and to weed out the ones that block legitimate traffic. This often prevents users from keeping their legacy WAF in full blocking mode.
Many vendors who primarily specialize in optimizing traffic flow have recently added ModSecurity-based WAFs to their offerings in an attempt to remake themselves into one-stop-shop for the websites with simple needs. Examples of these vendors include Cloudflare CDN, Fastly edge-computing, and NGINX load balancer.
Unlike legacy WAFs, Wallarm cloud-based WAF module is built from the ground up with the express purpose to automatically protect apps and APIs against the most sophisticated types of attacks. We have many customers who use Cloudflare as a CDN network and rely on Wallarm NGWAF for security.
To learn more about how Wallarm’s Automated Cloud Protection WAF works, sign up for a free demo today.
Read about the common problems with legacy WAFs and how they relate to consumer adoption and technology.
Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…
Your board wants AI. Your developers are building with it. Your budget committee is asking…
AI systems are no longer just isolated models responding to human prompts. In modern production…
Broken authorization is one of the most widely known API vulnerabilities. It features in the…
The shadow technology problem is getting worse. Over the past few years, organizations have scaled…
API security has been a growing concern for years. However, while it was always seen…