Web application firewall to buy time for patching attacks

Source: Internet
Author: User
Tags new features require firewall

Installing a Web application firewall in the right place means you can have a buffer time to patch your attacks according to your plan, and it is different to rush to modify the attack that is causing the application to stop or to pay extra for the emergency that the developer and tester are experiencing.

"That's the real return on investment," says Mark Kraynak, head of Imperva's product marketing department. Mark Kraynak also made a great contribution to the Web Application Security association's recently published Web application firewall assessment standards.

As one of many firewalls, the association gives the Web application firewall the definition "of an intermediary device that resolves the attack information from the layer Seventh application layer in the OSI model, based on security policy, between the Web client and the Web server." Web application Firewall protects the Web server from attack security devices.

"The goal of the WAFEC project is to help companies and organizations evaluate Web application firewalls," said Ivan Ristic, founder of the London Thinking Stone Web Application Security company and head of the Web application Firewall evaluation standard Project.

According to the association's instructions, WAF does not require the transformation of the source code. WAF can use a broker-based framework, or it can use a framework based on packet detection or both. WAFEC does not need a specific framework.

"The goal of the project is not to promote new features, but to give a way to compare different firewalls," says Jeremiah Grossman, chief technology officer, founder and project leader of Whitehat security company in Santa Clara, Calif. Documentation does not mean that all standards are required. Companies, organizations can refer to these standards, according to their own needs to create a more concise list of their own. Ristic said, "You cannot achieve everything listed in the document, many of the requirements are contradictory, that is to say, or the right choice, not all."

Many of the categories listed in the document include deployment frameworks, HTTP and HTML support, probing techniques, protection technologies, logging, reporting, management, performance, and XML.

WAFS Target is the application tier, not the network layer

Kraynak said that "WAFS is different from the network firewalls that focus on the perimeter of the network, but it has different concerns but more." A standard network fire wall does not search for cookies, it does not understand the meaning of URL parameters, which is another problem.

Ristic emphasizes the importance of a layered security model that has different security controls at different levels. "Place the Web application firewall in the right place, and you can watch, monitor, and view the attack signals." If you don't have a Web application firewall set up before your application, you don't know what's happening and you can't control what's going on. ”

Ristic also said that WAF is not omnipotent. "The application needs to start safely, which is very difficult." Web apps are definitely not always 100% secure. We should use security policy and achieve tiered protection. ”

Grossman added: "We have a network firewall for decades, and no one dares to declare that they can stop all attacks." Similarly, Web application firewalls are unlikely to prevent all attacks, and still require us to do something manually. ”

WAFS is still shaky.

Yankee, based in Boston, believes the WAF market is "ripe" but is not being properly guided. In 2005, WAF had a $40,000,000 market and grew at a rate of 10%. But in the past five years, the overall security market has been growing at a pace of 20% to 30%.

The Yankee company predicts that the WAF market will be dominated by a larger market, including the existing market, in the next few years, and that this larger market includes application assurance platforms, which will integrate WAFS, database security, XML security gateways and application blocking management.

Since companies are discussing whether they need WAF now, Forrester has given three suggestions:

1. Calculate the value of the asset that needs to be protected and the expected costs of a sector

2. Get the copy of the test version of the product and deploy it in the test environment

3. List only products that meet or exceed current and intermediate stages of demand

This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Firewall/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.