Don't have an account? Sign up
Web application firewalls (WAFs) are a critical security defence for websites, mobile applications and APIs. They monitor, filter and block data packets to and from web applications, protecting them from threats. WAFs are designed (trained) to detect and protect against dangerous security flaws that are most common within web traffic. This makes them essential for online businesses like retailers, banks, healthcare and social media, which need to protect sensitive data from unauthorised access. WAFs can be deployed as network-based, host-based or cloud-based solutions, providing visibility into application data at the HTTP application layer.
Since web and mobile applications and APIs are prone to security risks that can disrupt operations or exhaust resources, web application firewalls are designed to counter common web exploits like malicious bots. WAFs safeguard against threats that compromise availability, security or resources including zero-day exploits, bots and malware.
A WAF works by inspecting HTTP requests and applying predefined rules to identify malicious traffic. It can be software, an appliance or a service. The WAF analyses the following key parts of HTTP conversations:
The WAF also analyses the headers, query strings and body of HTTP requests for malicious patterns. If the WAF finds a match, it will block the request and send an alert to the security team.
WAFs are crucial for the security of online businesses. They protect sensitive data, prevent leaks, prevent malicious code from being injected into the server and meet compliance requirements like Payment Card Industry Data Security Standard (PCI DSS). As organisations increasingly use more web apps and IoT devices, attackers try to target their vulnerabilities. Integrating a WAF with other security tools like Cisco Duo 2FA and Cisco malware protection creates a robust defence strategy.
Many applications today are created using a combination of home-grown, third-party and open-source code. WAFs add an extra layer of security to inadequately built or legacy applications and help to enhance secure design practices by blocking common attack vectors and preventing malicious traffic from reaching the application. Below is a list of significant advantages specific to WAFs.
While network firewalls handle lower layers, WAF focuses on higher layers where web apps are more vulnerable. WAF is vital for robust application security.
While network firewalls handle lower layers, WAF focuses on higher layers where web apps are more vulnerable. WAF is vital for robust application security.
By positioning WAF in front of web apps, it safeguards them collectively. Its effectiveness against attacks such as cross-site scripting and injection attacks is a significant feature.
WAF intervenes to scrutinise legitimate requests, thwarting attacks like injection, cross-site scripting, HTTP Flood and Slowloris, ensuring safer web interactions.
Here are the basic differences between a WAF, an IPS and a next-generation firewall (NGFW). While an IPS is signature-based and broad in focus, operating at Layers 3 and 4, a WAF operates at the application layer (Layer 7). A WAF protects web applications by analyzing each HTTP request, and traditional WAFs ensure allowed actions based on security policies. NGFWs are advanced firewalls with integrated IPS and application-layer capabilities.
A WAF protects against a list of top vulnerabilities, including various forms of bots. Adversaries employ malicious bots to target applications and data, including account takeover, data scraping and denial-of-service attacks. With increasing API usage, bot attacks on APIs are also growing and conventional mitigation often fails against advanced bot tactics. Combating these threats necessitates a combined cybersecurity approach that integrates WAF along with device fingerprinting, behavioural analysis, bot intelligence and dedicated API protection. An effective WAF should include bot detection systems that include deep-learning abilities to recognise evolving bots that adapt to evade basic security systems. It's crucial to counteract bad bots with your WAF protection solution.
Below are some of the top WAF vulnerabilities and corresponding defense tactics provided by Cisco advanced WAF and bot protection technology.
Attack category | Explanation of attack / risk | WAF protection technology |
Broken user authentication | Weak authentication mechanisms allow unauthorised access. Attackers can exploit this vulnerability to bypass login screens and compromise user accounts. Examples include unauthorised access to APIs, IP, token, role and customer-based attacks. |
|
Excessive data exposure | When sensitive information is improperly stored, transmitted or disclosed, it becomes vulnerable. Attackers can access confidential data, leading to privacy breaches. Examples include environment fingerprinting, 5XX internal server errors and HTTP response headers. |
|
Security misconfigurations | Improperly configured settings, permissions or defaults create security gaps. Attackers can exploit these gaps to gain unauthorised access or control. Examples include incomplete or ad-hoc configurations, misconfigured HTTP headers, unnecessary HTTP methods. |
|
Broken access control | Broken access control permits unauthorised users to access restricted resources. Attackers exploit this vulnerability to gain unauthorised privileges. Examples include unauthorized access to APIs, IP, token, role, customer-based attacks and access to restricted APIs. |
|
Injection / cross-site scripting (XSS) | Injection attacks exploit vulnerable inputs. Attackers insert malicious code into systems, gaining unauthorised access or manipulating data by executing unintended commands. XSS vulnerabilities allow attackers to inject malicious scripts into web applications. These scripts execute in users' browsers, compromising their data or sessions. Examples include SQL injections, XSS, command injection and directory traversal. |
|
WAFs are constantly updated with new rules and signatures to safeguard against both known and emerging security threats through a variety of techniques to detect and block malicious traffic, including:
WAFs can help prevent Open Worldwide Application Security Project (OWASP) top vulnerabilities such as SQL injection and cross-site scripting (XSS) by blocking malicious traffic that attempts to exploit these vulnerabilities. For example, a WAF can block SQL injection attacks by filtering out requests that contain malicious SQL code. And a WAF can block XSS attacks by filtering out requests that contain malicious JavaScript code.
Here are several WAF deployment options that integrate WAFs into organisational cybersecurity infrastructure in the cloud.
This is a newer deployment option, where the WAF service is hosted in the cloud and delivered as a subscription.
Cloud-based AWS
Optimal for organisations with limited in-house security resources. Enjoy hassle-free deployment, with a third-party managing WAF security on AWS, allowing you to focus on core activities.
Read the Secure Cloud for AWS Design Guide (PDF)
Cloud-based Azure
A bundled cloud security solution. Quickly deploy security policies in a cost-effective manner, enjoying the benefits of WAF protection without complexities.
Get the Secure Cloud for Azure Design Guide (PDF)
Cloud-based Kubernetes WAF
Scalable application security for continuous integration and continuous delivery/continuous deployment (CI/CD) environments is orchestrated by Kubernetes.
This is the traditional deployment option, where the WAF virtual or hardware appliance is installed on site at the organisation's data centre. Suitable for organisations requiring flexibility, high performance and advanced security.
This is a combination of the on-premises and cloud-based deployment options, where the WAF appliance is installed on site and the cloud-based service is used to supplement it.