SlideShare a Scribd company logo
1 of 8
Download to read offline
Benefits of Web Application Firewall
What is Web Application Firewall?
Web Application Firewall (WAF) protects web and cloud applications against known and unknown
attacks at the application layer (such as SQL Injection, Cross Site Scripting or more general OWASP
Top10).
1.

Examine within the data payload ,beyond simple the IP or TCP headers

2.

Perform โ€Deep Packet Inspectionโ€

3.

Detect and respond to signatures for known application vulnerabilities

4.

Do not require modification to existing application code
A Typical WAF Architecture
Common WAF Features
โ—

Network Protocol Filtering

โ—

HTTP Protocol Filtering

โ—

Stateful Connection Monitoring

โ—

Cookie Monitoring /Protection

โ—

Hidden Field Enforcement

โ—

Brute-Force Monitoring

โ—

Honeypot/Honeynet Integration
Benefits of a WAF
โ—

Application attacks can be stopped before reaching webserver by filtering traffic:
1.
2.

At the IP/TCP level (layers 3-4)
At the application level (layers 5-7)

โ—

A network infrastructure solution can be provided for a software security problem

โ—

Resources normally dedicated to securing the code can be devoted to other security threats
Benefits of a WAF

โ—

Simply put,in perfect world proper ,secure application code would be written by developers
to keep their data safe.

โ—

But we donโ€™t live in a perfect world.

โ—

Therefore compensating controls, like Web Application Firewalls, will continue to be
necessary to protect organizationsโ€™ private data from being exposed.
Conclusion
1.

Organization canโ€™t ignore the importance of application code review

2.

Whenever possible ,the root cause of any security problem should be addressed before
compensating controls

3.

Not all organization have the capability to address security flaws at the code level

4.

Even well -coded application may eventually be vulnerable to OS level attacks

5.

โ€œNo one was ever fired for recommending defense-in-depth.โ€
Comodo Group Inc

Powered By
Comodo Group Inc
https://waf.comodo.com

More Related Content

What's hot

F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
ย 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
ย 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
ย 

What's hot (20)

Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
ย 
WAFs.pptx
WAFs.pptxWAFs.pptx
WAFs.pptx
ย 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
ย 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
ย 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
ย 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
ย 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
ย 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
ย 
API Security Fundamentals
API Security FundamentalsAPI Security Fundamentals
API Security Fundamentals
ย 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
ย 
FortiWeb
FortiWebFortiWeb
FortiWeb
ย 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
ย 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
ย 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
ย 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
ย 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
ย 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
ย 
AWS Security Week: Incident Response
AWS Security Week: Incident ResponseAWS Security Week: Incident Response
AWS Security Week: Incident Response
ย 
Cloud security
Cloud securityCloud security
Cloud security
ย 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
ย 

Similar to Benefits of Web Application Firewall

10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blocker
akila_mano
ย 
WAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rulesWAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rules
Dimitris Gkizanis
ย 
Ch20 book
Ch20 bookCh20 book
Ch20 book
amitnitttr
ย 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
ย 
Security_Bootcamp_Intro
Security_Bootcamp_IntroSecurity_Bootcamp_Intro
Security_Bootcamp_Intro
sudip pudasaini
ย 

Similar to Benefits of Web Application Firewall (20)

Web Access Firewall
Web Access FirewallWeb Access Firewall
Web Access Firewall
ย 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks
ย 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blocker
ย 
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
ย 
WAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rulesWAFFLE - A Web Application Firewall that defies rules
WAFFLE - A Web Application Firewall that defies rules
ย 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
ย 
2022 APIsecure_Secure your APIs with WAF in AWS
2022 APIsecure_Secure your APIs with WAF in AWS2022 APIsecure_Secure your APIs with WAF in AWS
2022 APIsecure_Secure your APIs with WAF in AWS
ย 
Ch20 book
Ch20 bookCh20 book
Ch20 book
ย 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016
ย 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
ย 
Security_Bootcamp_Intro
Security_Bootcamp_IntroSecurity_Bootcamp_Intro
Security_Bootcamp_Intro
ย 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
ย 
Zaccone Carmelo - IPv6 and security from a userโ€™s point of view
Zaccone Carmelo - IPv6 and security from a userโ€™s point of view Zaccone Carmelo - IPv6 and security from a userโ€™s point of view
Zaccone Carmelo - IPv6 and security from a userโ€™s point of view
ย 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
ย 
Future Internet Week - IPv6 the way forward: IPv6 and security from a userโ€™s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a userโ€™s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a userโ€™s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a userโ€™s ...
ย 
OWASP an Introduction
OWASP an Introduction OWASP an Introduction
OWASP an Introduction
ย 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
ย 
Injecting Security into Web apps at Runtime Whitepaper
Injecting Security into Web apps at Runtime WhitepaperInjecting Security into Web apps at Runtime Whitepaper
Injecting Security into Web apps at Runtime Whitepaper
ย 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
ย 
OWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITISOWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITIS
ย 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(โ˜Ž๏ธ+971_581248768%)**%*]'#abortion pills for sale in dubai@
ย 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
ย 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
ย 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
ย 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
ย 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
ย 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
ย 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
ย 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
ย 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
ย 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
ย 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
ย 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
ย 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
ย 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
ย 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
ย 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
ย 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
ย 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ย 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
ย 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
ย 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
ย 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
ย 

Benefits of Web Application Firewall

  • 1. Benefits of Web Application Firewall
  • 2. What is Web Application Firewall? Web Application Firewall (WAF) protects web and cloud applications against known and unknown attacks at the application layer (such as SQL Injection, Cross Site Scripting or more general OWASP Top10). 1. Examine within the data payload ,beyond simple the IP or TCP headers 2. Perform โ€Deep Packet Inspectionโ€ 3. Detect and respond to signatures for known application vulnerabilities 4. Do not require modification to existing application code
  • 3. A Typical WAF Architecture
  • 4. Common WAF Features โ— Network Protocol Filtering โ— HTTP Protocol Filtering โ— Stateful Connection Monitoring โ— Cookie Monitoring /Protection โ— Hidden Field Enforcement โ— Brute-Force Monitoring โ— Honeypot/Honeynet Integration
  • 5. Benefits of a WAF โ— Application attacks can be stopped before reaching webserver by filtering traffic: 1. 2. At the IP/TCP level (layers 3-4) At the application level (layers 5-7) โ— A network infrastructure solution can be provided for a software security problem โ— Resources normally dedicated to securing the code can be devoted to other security threats
  • 6. Benefits of a WAF โ— Simply put,in perfect world proper ,secure application code would be written by developers to keep their data safe. โ— But we donโ€™t live in a perfect world. โ— Therefore compensating controls, like Web Application Firewalls, will continue to be necessary to protect organizationsโ€™ private data from being exposed.
  • 7. Conclusion 1. Organization canโ€™t ignore the importance of application code review 2. Whenever possible ,the root cause of any security problem should be addressed before compensating controls 3. Not all organization have the capability to address security flaws at the code level 4. Even well -coded application may eventually be vulnerable to OS level attacks 5. โ€œNo one was ever fired for recommending defense-in-depth.โ€
  • 8. Comodo Group Inc Powered By Comodo Group Inc https://waf.comodo.com