A Security Application Manager configuration:
Defines how threats will be detected via:
Custom Rules: A custom rule identifies threats using custom criteria that takes into account your site's traffic profile to avoid false positives.
The Custom rules capability requires WAF Premier or WAF Standard. If you currently have WAF Essentials or WAF Insights and would like to use custom rules, please contact your CDN account manager to upgrade to the full version.
Identifies how the above rules are enforced on rate limited requests or threats .
Each detected threat is logged regardless of enforcement action (i.e., block, custom response, redirect, or alert). View logged threats from the Threats, Rates, or Rate Enforcement dashboards.
Standard security practices dictate that measures should be taken to prevent sensitive data (e.g., credit card information or passwords) from being passed as clear text from the client to your origin server. Another incentive for encrypting sensitive data is that it will be logged by our system when an alert is triggered as a result of this data. If sensitive data cannot be encrypted or obfuscated, then it is strongly recommended to contact our technical customer support to disable logging for the Matched Value field.
Allows you to keep your applications secure with known configurations and audit new access rules, custom rules, and managed rules without impacting production traffic. Use the Threats dashboard to isolate and analyze threats detected as a result of an audit of new access rules, custom rules, and managed rules.
The ability to secure and audit your production traffic using separate configurations requires WAF Premier, WAF Standard, or WAF Essentials. If you currently have WAF Insights and would like to use this capability, please contact your CDN account manager to upgrade to the full version.
Identify the set of traffic to which a Security Application Manager configuration's rules will be applied by host, URL path, or both.
By default, a Security Application Manager configuration applies to all hosts. However, you may limit a Security Application Manager configuration to one or more hosts. WAF compares the entire Host header value against the specified value.
Key information:
The Host header identifies either a hostname or IP address using the following syntax:
Host
Host:Port
WAF supports various comparison modes (i.e., exact match, wildcard, and regular expression).
By default, a Security Application Manager configuration applies to all URL paths. However, you may limit a Security Application Manager configuration to one or more URL paths. WAF compares the entire URL path against the specified value.
Key information:
URL path comparisons start directly after the hostname.
Example:
A partial match does not count towards the rate limit.
Example:
Given the above sample configuration, the following request would not count towards the rate limit:
WAF supports various comparison modes (i.e., exact match, wildcard, and regular expression).
Your Security Application Manager configuration determines how WAF compares a request's host or URL path against the specified value. The available modes are listed below.
Wildcard match: Use this mode to specify a wildcard pattern.
Wildcard and regular expression match comparison modes require WAF Premier, WAF Standard, or WAF Essentials. If you currently have WAF Insights and would like to use this capability, please contact your CDN account manager to upgrade to the full version.
WAF compares the specified value(s) against the entire host or URL path. It will only apply this Security Application Manager configuration to a request when one of the specified value(s) is an exact match. This comparison is case-sensitive.
Sample Configuration:
cat
bat
Matches:
cat
bat
Does Not Match:
Cat
Bat
Category
Moscato
Batch
WAF checks whether the entire host or URL path is a case-sensitive match for the wildcard pattern. The supported set of wildcards are listed below.
Wildcard | Description |
Example |
Matches |
Does Not Match |
---|---|---|---|---|
* |
Matches zero or more characters. |
cat*
|
cat category muscat |
cAt Category |
? |
Matches a single character. |
cat?
|
cats muscats |
Cats cat |
[abc] |
Matches a single character defined within the brackets. |
[cm]art
|
cart mart |
tart start |
[a-z] |
Matches a single character from the specified range. |
[a-z]art
|
cart mart tart |
Cart marT start |
[!abc] |
Matches a single character that is not defined within the brackets. |
[!cm]art
|
Cart Mart tart |
cart mart tArt |
[!a-z] |
Matches a single character that is excluded from the specified range. |
[!a-m]art
|
Cart Mart tart |
cart mart tArt |
Example:
Setting the URL path(s) option to the following value allows WAF to apply this Security Application Manager configuration to any request whose URL path starts with /marketing/:
The following sample request will match the above pattern:
WAF checks whether the entire host or URL path is a match for the pattern defined in a regular expression.
Regular expressions are case-sensitive.
Sample Configuration:
^[a-zA-Z0-9]*$
Matches:
cat
CAT7
Category
Does Not Match:
Category 7
Cat#7
Identify threats by adding the following rule(s) to your Security Application Manager configuration:
Rate Rules: A rate rule identifies malicious or unnecessary traffic through traffic patterns.
Requests that originate from rate limited clients will not count towards the rate limit. Upon the expiration of the time period defined in the Time period option, we will resume counting these requests. If the client exceeds the rate limit again, then this action will be reapplied to it for the duration defined by this option.
A "client" is defined by each rule according to the rate rule's Apply rate limit to option. For example, configuring that option to Any request will apply the selected action to all requests regardless of the number of requests generated by each device. Alternatively, identifying clients by IP address will only apply the selected action to requests that originate from each IP address that violates the specified rate limit.
Custom Rules: A custom rule identifies threats using custom criteria that takes into account your site's traffic profile to avoid false positives.
The Custom rules capability requires WAF Premier or WAF Standard. If you currently have WAF Essentials or WAF Insights and would like to use custom rules, please contact your CDN account manager to upgrade to the full version.
You may apply an access, custom, or managed rule in one of the following modes:
Audit: This mode allows you to test new security policies without impacting production traffic. Requests that are identified as threats are logged. Use the Threats dashboard to analyze detected threats and check for false positives. You should apply this security policy to production traffic once you are confident that it will generate minimal false positives.
Rate rules and Bot Manager may only run in production mode. You cannot run them in audit mode.
Auditing a profile that is already being applied to production traffic will cause the same threat to be logged twice.
You may customize how rules that run in production mode will be enforced. Enforcement is triggered when:
Key information:
The available enforcement actions are described below.
Mode | Description |
---|---|
Alert Only |
Rate limited requests or detected threats will only generate an alert. Our recommendation for testing new configurations is to use audit mode instead of applying the Alert Only enforcement action to a rule running in production mode. WAF applies a single enforcement action per mode (i.e., production or audit). Once enforcement is triggered for that mode, WAF does not perform further evaluation of that request. |
Block Request |
Access Rules, Custom Rules, and Managed Rules Detected threats will be dropped and the client will receive a 403 Forbidden response. |
Custom Response |
Rate limited requests or detected threats will receive a custom response.
|
Drop request |
Rate Rules Only Rate limited requests will be dropped and the client will receive the following response:
The Retry-After response header provides a hint to the client as to when service may resume. |
Redirect (HTTP 302) |
Rate limited requests or detected threats will be redirected to the specified URL. Key information:
|
A custom response header value or a custom response body may include variables that describe the event. These variables are described below.
Variable | Description |
---|---|
EVENT_ID |
Represents the system-defined ID assigned to the request that was identified as a threat. Find out detailed information about the detected threat by passing this ID to the Get Event Log Entry endpoint (REST API). |
CLIENT_IP |
Represents the IP address of the device that submitted the detected threat. |
TIMESTAMP |
Represents the date and time at which the detected threat was submitted. |
REQUEST_URL |
Represents the URL for the request that was deemed a threat. |
Add an event variable to a custom response header value or a custom response body by enclosing it with double curly braces.
Example:
The recommended practice is to create a Security Application Manager configuration that is tuned for each of your applications. This allows you to apply a restrictive security policy with minimal false positives. Each Security Application Manager configuration's host and URL path conditions determine the set of traffic to which it may be applied. If a request is eligible to be screened by multiple Security Application Manager configurations, then WAF will screen it using the first eligible configuration in the list.
Reorder Security Application Manager configurations by dragging the desired configuration's icon to the desired position.
You may create, modify, and delete Security Application Manager configurations.
Key information:
Identify the set of traffic (e.g., all requests or by customer origin) to which your security policy will be applied by balancing the need to secure as much traffic as possible with the level of restrictive measures imposed by it.
The recommended approach is to apply the most restrictive policy to as much traffic as possible while causing minimal impact to data delivery.
Apply access rules, rate rules, custom rules, and managed rules to production traffic by adding it to a Security Application Manager configuration and then determining how it will be enforced.
Rules are administered independently from Security Application Manager configurations. This allows you to use the same rule within multiple Security Application Manager configurations. Leverage this capability to tailor security screening by application or traffic profile.
Define the enforcement action(s) for Bot Manager when setting up your Bot Manager configuration.
To create a Security Application Manager configuration
Navigate to the Security Application Manager page.
Optional. Identify the set of traffic to which this security policy will be applied by defining a hostname and/or URL path through the Hostname and URL path(s) options.
Select one of the following modes:
Exact match (multiple entries): Use this mode to apply this Security Application Manager configuration to the specified hostname(s) or URL path(s).
Wildcard match: Use this mode to apply this Security Application Manager configuration to all hostnames or URL paths that satisfy the specified wildcard pattern.
Regex match: Use this mode to apply this Security Application Manager configuration to all hostnames or URL paths that satisfy the specified regular expression pattern.
Enable the Negative match option to configure a Security Application Manager configuration to look for requests that do not match the specified value or pattern.
Optional. Select an access rule through which production traffic will be screened and determine how threats identified by it are handled.
If you have not already created the desired access rule, you can save your Security Application Manager configuration, create an access rule, edit your Security Application Manager configuration, and then resume this procedure.
From the Action type option, determine how threats identified by the access rule selected in step ii will be handled (i.e., block, alert, redirect, or send a custom response).
Optional. Audit production traffic using a new access rule.
Filter the Threats dashboard by the above access rule or the audit profile type to track detected threats.
Disable auditing by setting the Audit Managed Rule option to No Audit Rule.
Optional. Select a rate rule through which production traffic will be rate limited.
If you have not already created the desired rate rule, you can save your Security Application Manager configuration, create a rate rule, edit your Security Application Manager configuration, and then resume this procedure.
From the Add Rate Rule option, select the desired rate rule.
If the selected rate rule contains a condition group, then a request must satisfy the Security Application Manager configuration's host and URL path match conditions and all of the conditions within at least one condition group in order to be eligible for rate limiting.
From the Action type option, determine how threats identified by the managed rule selected in step ii will be handled (i.e., drop request, alert, redirect, or send a custom response).
WAF does not perform further evaluation of a request once enforcement is triggered.
For this reason, we recommend that you limit your use of the Alert Only enforcement to the shortest amount of time necessary to validate changes to your configuration.
From the Time period option, select the time period for which the action selected in the next step will be applied to clients that exceed the rate limit defined in the rate rule selected in step ii.
A "client" is defined by each rate rule according to the Apply rate limit to option. For example, configuring that option to Any request will apply the selected action to all requests regardless of the number of requests generated by each device. Alternatively, identifying clients by IP Address will only apply the selected action to requests that originate from each IP address that violates the specified rate limit.
If you would like to apply an additional rate limit, then repeat steps ii - v.
Use multiple rate rules to apply different rate limits to various traffic profiles. Set up this type of configuration using either a single or multiple Security Application Manager configurations. If you assign multiple rate rules to a single Security Application Manager configuration, then each rate rule should contain one or more condition group(s).
Optional. Select a bot rule that identifies the set of production traffic that will be screened by Bot Manager.
If you have not already created the desired bot rule, you can save your Security Application Manager configuration, create a Bot Manager Basic or Advanced configuration, edit your Security Application Manager configuration, and then resume this procedure.
Optional. Select a custom rule through which production traffic will be screened and determine how threats identified by it are handled.
If you have not already created the desired custom rule, you can save your Security Application Manager configuration, create a custom rule, edit your Security Application Manager configuration, and then resume this procedure.
From the Action type option, determine how threats identified by the custom rule selected in step ii will be handled (i.e., block, alert, redirect, or send a custom response).
Optional. Audit production traffic using a new custom rule.
Filter the Threats dashboard by the above custom rule or the audit profile type to track detected threats.
Disable auditing by setting the Audit Custom Rule option to No Audit Rule.
Optional. Select a managed rule through which production traffic will be screened and determine how threats identified by it are handled.
If you have not already created the desired manged rule, you can save your Security Application Manager configuration, create a managed rule, edit your Security Application Manager configuration, and then resume this procedure.
From the Action type option, determine how threats identified by the managed rule selected in step ii will be handled (i.e., block, alert, redirect, or send a custom response).
Optional. Audit production traffic using a new managed rule.
Filter the Threats dashboard by the above managed rule or the audit profile type to track detected threats.
Disable auditing by setting the Audit Managed Rule option to No Audit Rule.
To reorder Security Application Manager configurations
If multiple Security Application Manager configurations are applicable to the same request, then consider updating their host or URL path conditions to a more restrictive pattern.
Traffic is always screened using the first eligible Security Application Manager configuration.
To modify a Security Application Manager configuration
Navigate to the Security Application Manager page.
To delete a Security Application Manager configuration
Navigate to the Security Application Manager page.
Edgecast CDN