Skip to content

Commit 6f0b4b1

Browse files
authored
feat: Enhance WAF references
1 parent c299830 commit 6f0b4b1

1 file changed

Lines changed: 27 additions & 12 deletions

File tree

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 27 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -675,7 +675,7 @@ Implementation:
675675
- 8.14
676676
isImplemented: false
677677
evidence: ""
678-
comments: ""
678+
comments: ""
679679
WAF baseline:
680680
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b
681681
risk:
@@ -690,6 +690,8 @@ Implementation:
690690
- Gradually switch to a proactive blocking stance as confidence in the accuracy of the rules increases
691691
692692
It's crucial to monitor and update the WAF configuration to adapt to evolving threats and minimize the potential for both false positives and false negatives.
693+
694+
There are debates on how useful a WAF is for APIs.
693695
difficultyOfImplementation:
694696
knowledge: 3
695697
time: 4
@@ -701,11 +703,14 @@ Implementation:
701703
dependsOn:
702704
- Contextualized encoding
703705
implementation: []
704-
references:
705706
samm2:
706-
- TODO: Identify and implement SAMM security practices relevant to WAF configuration.
707+
- D-SR-3-A
708+
iso27001-2017:
709+
- Hardening is not explicitly covered by ISO 27001 - too specific
710+
- 13.1.3
707711
iso27001-2022:
708-
- TODO: Integrate WAF deployment with ISO 27001 controls for system hardening.
712+
- Hardening is not explicitly covered by ISO 27001 - too specific
713+
- 8.22
709714
comments:
710715
WAF medium:
711716
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b
@@ -716,12 +721,14 @@ Implementation:
716721
description: |
717722
A medium-level WAF configuration builds upon the baseline to offer a more nuanced and responsive defense mechanism against a wider array of threats.
718723
719-
Steps:
724+
Sample steps:
720725
- Implement an enhanced set of WAF rules based on baseline data
721726
- Continuous monitoring and fine-tuning of the WAF configuration
722727
- Develop a strategic incident response plan utilizing WAF insights
723728
724729
The medium configuration requires diligent management and continuous improvement to address new vulnerabilities while maintaining the integrity of application access.
730+
731+
There are debates on how useful a WAF is for APIs.
725732
difficultyOfImplementation:
726733
knowledge: 4
727734
time: 5
@@ -733,11 +740,14 @@ Implementation:
733740
dependsOn:
734741
- WAF baseline
735742
implementation: []
736-
references:
737743
samm2:
738-
- TODO: Establish advanced SAMM security practices for WAF management.
744+
- D-SR-3-A
745+
iso27001-2017:
746+
- Hardening is not explicitly covered by ISO 27001 - too specific
747+
- 13.1.3
739748
iso27001-2022:
740-
- TODO: Ensure WAF processes are integrated into the overall security management in accordance with ISO 27001 standards.
749+
- Hardening is not explicitly covered by ISO 27001 - too specific
750+
- 8.22
741751
comments:
742752

743753
WAF Advanced:
@@ -749,7 +759,7 @@ Implementation:
749759
description: |
750760
This advanced configuration goes beyond typical WAF implementations by enforcing strict input format checks and parameter validation to prevent any unauthorized or malformed data from compromising the application.
751761
752-
Steps:
762+
Sample Steps:
753763
- Implement strict data type and format validation rules to ensure only correctly formatted data is processed.
754764
- Establish a denylist for all parameters that are not explicitly required, blocking them by default.
755765
- Develop and continuously refine custom rulesets based on the application's traffic patterns, user behavior, and known vulnerabilities.
@@ -759,6 +769,8 @@ Implementation:
759769
- Activate automated threat response mechanisms to immediately neutralize detected threats.
760770
761771
Embracing an advanced WAF setup requires a proactive approach, with continuous improvement and updating of security measures to ensure all inputs are scrutinized and validated, thus maintaining a resilient security posture against sophisticated attacks.
772+
773+
There are debates on how useful a WAF is for APIs.
762774
difficultyOfImplementation:
763775
knowledge: 5
764776
time: 5
@@ -770,11 +782,14 @@ Implementation:
770782
dependsOn:
771783
- WAF medium
772784
implementation: []
773-
references:
774785
samm2:
775-
- TODO: Develop an advanced threat management framework that includes rigorous input validation strategies.
786+
- D-SR-3-A
787+
iso27001-2017:
788+
- Hardening is not explicitly covered by ISO 27001 - too specific
789+
- 13.1.3
776790
iso27001-2022:
777-
- TODO: Incorporate advanced WAF input validation processes into the organization's ISMS.
791+
- Hardening is not explicitly covered by ISO 27001 - too specific
792+
- 8.22
778793
comments:
779794

780795

0 commit comments

Comments
 (0)