F5 WAF – High Protection
I’ve
already written about Good
Protection
and Elevated
Protection
for the last two weeks where
I’ve written about lots of useful security features to protect web
services. Features
such as Attack Signatures and Protocol Compliance are examples of
Good Protection, and features such as Bot Protection and CSRF
Protection are examples of Elevated Protection. These features are
enough for most companies. We are going to block 80% of attacks with
these security features. However, there are still 20% of attacks which
can be very
dangerous for some companies. Therefore,
these companies require High Protection. More security features and
more sophisticated.
Disallowed
File Types is a best practice for Elevated Protection, but if we want
to improve and protect better the web services, we’ll also have to
create an Allowed
URL List.
This
is going to be a whitelist of allowed URL which will never be
blocked. For
instance, we should configure /login.jsp as an explicit URL allowed
and /products/* as a string pattern allowed. All other URL will be
deny. In addition, the User
Session Tracking
help us to improve
the security policy. This security feature is able to track all
application traffic during a user session, allowing us to perform
user validation and gather insights about users.
Allowed URL List |
If you
are working with passwords, account numbers, credit card numbers,
social security numbers, or other valuable personal data, you’ll be
interested in DataSafe.
This
is a security feature that protects data before users send it from
their browser. If
you have Advanced WAF, you have the DataSafe feature. On
the other hand, sensitive web applications sometimes also obtain and
store browser fingerprinting data when you log in to detect Session
Hijacking Attacks.
However,
the
BIG-IP ASM system can also protect common web applications against
hijacking and other attacks.
Credential Theft Using Malware (DataSafe) |
Brute
Force Attack Protection
is also a High Protection feature. Most security devices are able to
lock an account when there are unsuccessful authentication attempts
repeatedly. Hackers attempt to guess users’ account again and
again. Another
version of this attack is called “credential stuffing”. Hackers
make only one attempt to log in to users’ accounts because they
obtain the credentials from a compromised application. The BIG-IP ASM
system are able to detect these attacks based on failed login
attempts, user device IDs or user IP addresses.
Brute Force Protection Configuration |
Finally,
there are some applications which need to be bypassed, for
instance,
for testing a new version, penetration testing or using automated
scanning tools to identify and resolve vulnerabilities. Therefore,
Blocking Mode
Override
is also an useful security feature. We
are going to configure an unique hostname in the host header which
will be allowed to bypass Blocking and be handled by Transparent
enforcement mode. However,
we have to maintain secrecy or ensure regular rotation of this
hostname to keep blocking malicious traffic.
Blocking Mode Override |
Regards!
I
hope these security features fit your needs.
Commentaires
Enregistrer un commentaire