Web application firewall
A web application firewall filters, monitors, and blocks HTTP traffic to and from a web application. A WAF is differentiated from a regular firewall in that a WAF is able to filter the content of specific web applications while regular firewalls serve as a safety gate between servers. By inspecting HTTP traffic, it can prevent attacks stemming from web application security flaws, such as SQL injection, cross-site scripting, file inclusion, and security misconfigurations.
History
Application firewalls, which control input, output, and access from applications or services, were first developed in the early 1990s as network firewall extension by Gene Spafford, Bill Cheswick, and Marcus Ranum. Their product was largely a network-based firewall but could handle a few applications and was released to market by DEC. Within the next few years, the products were further developed by other researchers to provide stable firewall software for others to build on, and raised the bar for the industry.Dedicated web application firewalls entered the market later in the decade when web server hacker attacks were becoming much more noticeable.
The first company to invent and offer a dedicated web application firewall was Perfecto Technologies with its AppShield product, which focused on the e-commerce market and protected against illegal web page character entries. The company was founded by Eran Reshef and Gili Raanan who are also the inventors of the first dedicated WAF. Perfecto renamed itself as Sanctum and named the top ten web application hacking techniques and laid the foundations for the WAF market:
- Hidden field manipulation
- Cookie poisoning
- Parameter tampering
- Buffer overflow
- Cross site scripting
- Backdoor or debug options
- Stealth commanding
- Forced browsing
- Third party misconfigurations
- Known vulnerabilities
Since then, the market has continued to grow and evolve, involving the larger commerce industry with the rise in credit card fraud. With the development of the Payment Card Industry Data Security Standard, a standard for organizations to increase controls on cardholder data, security is more regulated and has sparked wide-scale interest in the industry. According to CISO Magazine, the WAF market size was expected to grow to $5.48 billion by 2022.
Description
A web application firewall is a special type of application firewall that applies specifically to web applications. It is deployed in front of web applications and analyzes bi-directional web-based traffic - detecting and blocking anything malicious. The OWASP provides a broad technical definition for a WAF as “a security solution on the web application level which - from a technical point of view - does not depend on the application itself.” According to the PCI DSS Information Supplement for requirement 6.6, a WAF is defined as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.” In other words, a WAF can be a virtual or physical appliance that prevents vulnerabilities in web applications from being exploited by outside threats. These vulnerabilities may be because the application itself is a legacy type or it was insufficiently coded by design. The WAF addresses these code shortcomings by special configurations of rule-sets, also known as policies.Previously unknown vulnerabilities can be discovered through penetration testing or via a vulnerability scanner. A web application vulnerability scanner, also known as a web application security scanner, is defined in the SAMATE NIST 500-269 as “an automated program that examines web applications for potential security vulnerabilities. In addition to searching for web application-specific vulnerabilities, the tools also look for software coding errors.” Resolving vulnerabilities is commonly referred to as remediation. Corrections to the code can be made in the application but typically a more prompt response is necessary. In these situations, the application of a custom policy for a unique web application vulnerability to provide a temporary but immediate fix may be necessary.
WAFs are not an ultimate security solution, rather they are meant to be used in conjunction with other network perimeter security solutions such as network firewalls and intrusion prevention systems to provide a holistic defense strategy.
WAFs typically follow a positive security model, a negative security, or a combination of both as mentioned by the SANS Institute. WAFs use a combination of rule-based logic, parsing, and signatures to detect and prevent attacks such as cross-site scripting and SQL injection. The OWASP produces a list of the top ten web application security flaws. All commercial WAF offerings cover these ten flaws at a minimum. There are non-commercial options as well. As mentioned earlier, the well-known open source WAF engine called ModSecurity is one of these options. A WAF engine alone is insufficient to provide adequate protection, therefore OWASP along with Trustwave's Spiderlabs help organize and maintain a Core-Rule Set via GitHub to use with the ModSecurity WAF engine.
Deployment options
Although the names for operating mode may differ, WAFs are basically deployed inline in three different ways. According to NSS Labs, deployment options are transparent bridge, transparent reverse proxy, and reverse proxy. 'Transparent' refers to the fact that the HTTP traffic is sent straight to the web application, therefore the WAF is transparent between the client and server. This is in contrast to reverse proxy, where the WAF acts as a proxy and the client’s traffic is sent directly to the WAF. The WAF then separately sends filtered traffic to web applications. This can provide additional benefits such as IP masking but may introduce disadvantages such as performance latency.Commercial vendors
Many commercial WAFs have similar features, but major differences often refer to user interfaces, deployment options, or requirements within specific environments. Notable vendors include:Appliance
- Barracuda Networks WAF
- Citrix Netscaler Application Firewall
- F5 BIG-IP Advanced WAF
- Fortinet FortiWeb
- Imperva SecureSphere
- Qualys WAF
- Radware AppWall
- Rohde & Schwarz Cybersecurity WAF
Cloud
- Akamai Technologies Kona
- Alibaba Cloud
- Amazon Web Services AWS WAF
- Barracuda Networks CloudGen WAF and WAF-as-a-Service
- CDNetworks
- Cloudbric
- Cloudflare
- Fortinet FortiWeb
- F5 Silverline
- Fastly
- IBM Cloud Internet Services WAF
- Imperva Incapsula
- Microsoft Azure Application Gateway with WAF
- Oracle Cloud Infrastructure WAF
- Qualys WAF
- Radware
- Rohde & Schwarz Cybersecurity WAF
- Sucuri Firewall
- VMware NSX Advanced Load Balancer
- RedShield
- Wallarm
Open-source
- ModSecurity