Best Practices Guide WAF V104.en
Best Practices Guide WAF V104.en
Best Practices:
Abstract
Web applications of all kinds, whether online shops or partner portals, have in recent years
increasingly become the target of hacker attacks. The attackers are using methods which are
specifically aimed at exploiting potential weak spots in the web application software itself – and this is
why they are not detected, or are not detected with sufficient accuracy, by traditional IT security
systems such as network firewalls or IDS/IPS systems. OWASP develops tools and best practices to
support developers, project managers and security testers in the development and operation of secure
web applications. Additional protection against attacks, in particular for already productive web
applications, is offered by what is still a emerging category of IT security systems, known as Web
Application Firewalls (hereinafter referred to simply as WAF), often also called Web Application Shields or
Web Application Security Filters.
One of the criteria for meeting the security standard of the credit card industry currently in force (PCI
DSS - Payment Card Industry Data Security Standard v.1.1) for example, is either a regular source
code review or the use of a WAF.
The document is aimed primarily at technical decision-makers, especially those responsible for
operations and security as well as application owners (specialist department, technical application
managers) evaluating the use of a WAF. Special attention has been paid – wherever possible – to the
display of work estimates – including in comparison to possible alternatives such as modifications to
the source code.
In addition to the importance of the web application regarding turnover or image – the term access to a
web application used in this document can be a good criterion in the decision-making process relating
to the use of WAFs. Specifically, the access to a web application, measures the extent to which the
required changes to the application source code are actually carried out in-house, on time,or can be
carried out by third parties. As ilustrated by the graph below, a web application to which there is no
access, can only be protected sensibly by a WAF (additional benefit of the WAF),.Even with an
application in full access, a WAF can be used as a central service point for various services such as
secure session management, which can be implemented for all applications equally, and as a suitable
means for proactive safety measures such as URL encryption
Further key topics dicussed in this paper include best practices for processes concerning the
installation and operation of a WAF as well as –in particular for larger companies – a description of the
role of the WAF application manager.
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
About …
This document has been developed by the OWASP German Chapter. The authors are employees of
companys, who are consulting on the use and operation of WAFs, are producing WAFs and/or are
setting up WAFs.
Authors
Terminology
The specialist terms used in this document are not explained in detail and knowledge of their meaning
is assumed. No glossary has been included in order to keep the volume manageable and to keep to
the actual subject of this paper as closely as possible – the use of Web Application Firewalls.
Detailed definitions and more in-depth descriptions concerning WAS – Web Application Security –
can be found at:
Licence
This document is licensed under a
Creative Commons attribution under equivalent conditions as the 2.0 Germany licence
Contents
A1 Introduction and aim of this document 5
A1.1 Introduction 5
A1.2 Definition of the term WAF – Web Application Firewall 5
A1.3 Target readership and objective 5
A2 Characteristics of web applications with regard to Web Application Security 6
A2.1 Higher level aspects within the organization 6
A2.2 Technical aspects of each of the company’s individual web application 6
A3 Overview of Web Application Firewall (WAF) features 7
A3.1 Where WAFs fit into the Web Application Security field as a whole 7
A3.2 Typical security mechanisms of WAFs using specific vulnerabilities as example 8
A4 Overview of benefits and risks of Web Application Firewalls 10
A4.1 Main benefits of WAFs 10
A4.2 Additional benefits of WAFs – depending on the actual functionality of the product 10
A4.3 Risks in the use of WAFs 11
A5 Security versus OWASP TOP10 – a comparison of WAFs and other methods 12
A6 Criteria for deciding whether or not to use a WAF 16
A6.1 Organization-wide criteria 16
A6.2 Criteria with regard to a web application 16
A6.3 Evaluation and summary 16
A6.4 A consideration of the financial aspects 17
A7 Best practices for introducing and operating a WAF 19
A7.1 Aspects of the existing web infrastructure 19
7.1.1 Central or decentral infrastructure – predictable changes 19
7.1.2 Performance criteria 19
A7.2 Organisational aspects 19
7.2.1 Conforming to existing security policies 19
7.2.2 New role model: WAF application manager 19
A7.3 Iterative procedure for implementation – from basic security to full protection 20
7.3.1 Step 1: Specification of role distribution / inclusion of application development 20
7.3.2 Step 2: Basic protection for all web applications 20
7.3.3 Step 3: Creating a priority list of all existing web applications 20
7.3.4 Further steps: Full protection of the web applications according to priority 20
A8 Appendices 21
A8.1 Checklist: Access to a web application from a security-standpoint 21
A8.2 Role model when operating a WAF 22
A8.3 The individual roles 23
8.3.1 WAF platform manager 23
8.3.2 WAF application manager (per application) 23
8.3.3 Application manager 23
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
A1.1 Introduction
Whether the online branch of a bank, an online-shop, a customer-, partner- or employee-portal – all of
these web applications are available to their customers – as well as their attackers – around the clock
due to the always on nature of the internet. Attacks such as SQL injection, cross-site scripting or
session hijacking are aimed at vulnerabilities in the web applications itself – and not at those on the
network level. For this reason, traditional IT security systems such as firewalls or IDS/IPS are either
totally unable to guard against these attacks or are incapable of offering comprehensive protection.
From a technical point of view the fundamental issue is, that the web, especially the HTTP protocol,
was not designed for such complex applications which are currently state of the art. Many
vulnerabilities have their origin here: for example, HTTP is not stateful, i.e. sessions or stateful
applications must be defined separately and implemented securely. These vulnerabilities are
increased even further by the high degree of complexity of the web scripts, frameworks and web
technologies frequently used.
In addition to the recent introduction of industrial standards, e.g. the data security standard of the
credit card industry (PCI DSS v1.1), security breaches in Germany which have only recently been
revealed, such as the loss of approx. 70,000 items of customer data incl. credit card information for
online ticker dealer kartenhaus.de, have ensured an increased level of interest in possible security
measures against application level attacks.
This document covers a category of security systems, the Web Application Firewalls (WAF), which are
especially well suited for securing web applications which are already in production.
One of the most important aspects is the number of productive web applications in the company.
Large companies often operate – in-house or externally – web applications numbering in the
hundreds. Even if a prioritisation of each individual web application in order of its relevance for the
success of the organization is reasonable , it is nevertheless necessary to assume that all web
applications operated in-house – depending on the architecture – could permit an attack on internal
systems given the right attack methods. Even web applications which seem to be “unimportant” at first
glance should at minimum be secured against known attacks.
The following aspects should be considered when prioritizing web applications in regard to their
importance for the organization:
For already completed or productive applications, very different aspects are relevant with regard to
subsequent possible security measures, such as:
• Complete documentation of the architecture and the source code or availability of the developers
of the web application
• Maintenance contracts for all components of the application architecture
• Short error rectification times by the manufacturer of third party products used
Only if these aspects have been met, the application can be secured within the existing application
infrastructure, not regarding the amount of work involved.
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
A3.1 Where WAFs fit into the Web Application Security field as a whole
The basic principle is that every web application should be developed as secure as possible. This is
because the later a vulnerability is detected in the life cycle of a web application, the greater the risk of
a successful attack, and often also the amount of work involved in correcting the issue.
In addition to appropriate training measures, e.g. on the basis of the OWASP guidelines the
application development can be supported effectively by the use various tools. Tools such as Stinger
are normally based on a framework – J2EE in this example; they are part of the application (even if
they can be added to completed applications conforming to J2EE) and, from an organisational point of
view, are thus generally subject to the normal application release cycle. At their core, they effective
help developers in making their application more secure. Unlike WAFs, they will always be part of the
application, however. These tools are mentioned in this document at various points, in particular in
relation to the comparative amount of work for various security measures, but they themselves are not
the focus of this document.
In the development phase, methods such as static source code analysis help to promptly detect and
rectify vulnerabilities in the code. This additonally includes penetration tests, ideally carried out by
experts, which cover the vulnerabilities in the external behaviour of the web application in productive
operation as well.
In this context, it is the primary function of a WAF to secure web applications against detected
vulnerabilities , with as little effort as possible, so that they cannot be exploited by attackers. This is
already a very challenging task due to the high degree of complexity of the typical web-application
infrastructure: web servers, application servers, frameworks, as well as the typical components of a
web application; session handling with cookies, input validation, etc.
The main aim in using a WAF is therefore securing the existing, often productive web applications,
where the required changes within the application can no longer be implemented or can only be
implemented with a disproportionately large amount of work. This applies to vulnerabilities in particular
which have been revealed via a penetration test or even via analysis of the source code, , and –
especially in the short term – cannot be fixed within the application. Besides the basic protection via
blacklisting – in other words the description of known attack patterns – the basic feauture of the WAF
is the option of whitelisting which can be configured appropriately. With active whitelisting, the rule set
of the WAF describes the exact behaviour of the application; the configuration of suitable whitelists is
often supported via a learning mode.
In addition, several WAFs also offer functionalities which extend beyond a purely protective nature and
which can therefore also be used in the design process in order to avoid unnecessary work. The WAF
therefore becomes a central service point for completing tasks which should otherwise be on the
application side, but which can and should be adressed in the same way for all applications. Examples
of this include secure session management for all applications based on cookie stores, central
authentication and authorisation, the collection of all relevant error messages and log files or the
option for proactive security mechanisms such as URL encryption.
The table below uses what are currently the most well-known vulnerabilities or methods of attack on
web applications to indicate the protection offered by WAFs. The usual functionality of a WAF is
assumed, although not all WAFs available on the market necessarily offer all the functionality
described here.
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
File upload + Virus check (generally via external systems) via ICAP linked to the
WAF
Parameter tampering + In addition to/instead of data validation (see below), parameter
+ manipulation can be prevented via URL encryption (GET) and
parameter encryption (GET and POST)
Site usage enforcement, meaning the possible sequence of URLs
can be fixed or can be detected
Forced browsing + Can be prevented via URL encryption
+ Site usage enforcement
Path traversal (URL) link + Can be prevented via URL encryption
validation + Site usage enforcement
Path traversal (parameter), + See parameter tampering and data validation
path manipulation
Logging + All or only specific/permitted parts of the data of a request and of the
connected tests can be logged
Priv. escalation - Privilege escalation cannot be checked, or can only be checked to a
limited degree, for example via cookie/parameter encryption
Logical level - Application logic going beyond the validity of URLs and form fields,
cannot normally be checked by a WAF
Anti-automation = Automatic attacks can be partially detected and blocked (e.g.
number of requests/time interval, identical requests, etc.)
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
1
Basic protection with blacklisting generally sufficient, other options be combining blacklisting and whitelisting
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
On the one hand, the WAF offers a basic protection against known attacks or vulnerabilities based on
blacklists: The data security standard of the credit card industry (PCI DSS v.1.1) for example, in its
current version prescribes the use of a WAF – as an alternative to regular code reviews by a specialist
– as an adequate measure to protect web applications. The WAF is therefore a suitable tool for
attaining industrial standards as well as fulfilling legal requirements.
The use of a WAF becomes especially relevant in the case of concrete vulnerabilities, for example
uncovered via penetration tests or source code reviews. Even if it were possible to fix the vulnerability
in the application promptly and with a reasonable amount of effort, the modified version can generally
only be deployed at the next maintenance interval, often 2-4 weeks later (patch dilemma). For a WAF
with whitelisting, the vulnerability can be fixed promptly (hotfix), so that it cannot be exploited before
the next scheduled maintenance. WAFs are especially fast in this aspect, meaning they can
collaborate with source code analysis tools, so that detected external vulnerabilities can automatically
result in a recommended rule set for the WAF.
A WAF is particularly important in securing productive web applications which themselves in turn
consist of multiple components and which cannot be quickly changed by the operator; e.g. in the case
of poorly documented applications or regarding third-party products without sufficient maintenance
cycles. A WAF is the only option for promptly closing external vulnerabilities.
Many WAFs also provide proactive security mechanisms such as URL encryption or site usage
enforcement, in order to minimise the area of attack with as little effort as possible. In addition, the use
of a WAF increases the robustness of a web applications to external attacks.
WAFs offer other additional benefits depending on the type of implementation. A hardware appliance
in front of the web servers can often terminate SSL connections and also sometimes has load
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
balancer capabilities. This can be desirable, but can also be provided by suitable web application
security add-ons for products already in use. In high-security environments, however, the existing
security guidelines frequently prohibit the termination of SSL connections in front of the web server. In
this case, WAFs which are implemented as a plug-in for the web server are especially well-suited.
The WAF can also provide a SSL termination if the application to be protected or its web server or
application server does not have this capability.
Security measures within the application or the application architecture itself are described in detail
and are evaluated, based on these three classes, either with the use of a WAF or, alternatively by
definition of an appropriate security policy The security measures are also assessed in regard to the
amount of work required for their implementation . In some instances, there are notes on special
functionalities of WAFs or assumptions on the application infrastructure used, as these do not apply
globally.
As the table below clearly shows, especially in the case of applications which are in production, the
use of WAFs very often requires the least amount of work.. In the case of applications which cannot be
modified or which are difficult to modify, in some instances the use of WAFs is actually the only
feasible security measure.
In the table below, the Work volume column lists the estimated amount of work required for the
application types (T1, T2, T3), a WAF or a security policy (P) in regard to the threat (Top 10 column)
Comments and notes for each type regarding the implementation of security measures can be found
in the Comment column. The categories for the work volume are:
T3 - -
WAF WAF with blacklisting: 2
In principle can only search for specific characters or
character strings and prevent processing. Essentially there
are problems with this approach in the degree of coverage
as well as with possible filter evasion attacks (e.g. with
multiple coding) if no input normalisation is carried out.
This works very well with known attacks (e.g. SQL
injection), but certainly less well with protocols not known
to the WAF or with proprietary protocols. In addition,
injection attacks on a some types of input data can be
effectively prevented using URL encryption and hidden
form parameter protection. An example of this is the item
number in an online shop, which traditionally would often
be used for SQL injection attacks, but it should never
actually be possible for users to manipulate these directly.
WAF with whitelisting:
For all other input fields, there is a whitelist approach. Here
the WAF can make suggestions for the individual fields
following a learning phase. This means that not all, but the
majority of the input fields can be protected against all
types of injection attacks.
P In the case of SQL injection: Specifications for database -
access permissions, otherwise little or no options.
A3 Malicious File T1 Integrating upload scanners or whitelisting of the permitted 2
Execution remote inclusions.
T2 3
T3 - -
WAF Whitelisting of the parameters for the permitted inclusion of 1-2
URLs external to the system
- inclusion of upload scanners via ICAP protocol
- response analysis to prevent the display of critical data
(partially also error messages).
P Specifications for deployment platform, specifications for 2
access permissons
A4 Insecure Direct T1 Implementation of an object virtualisation is very time- 3
Object Reference consuming, as database objects are frequently mapped to
parameters by the frameworks in use (OR mapper).
Protection requires intensive testing.
T2 Prevention of ID manipulation generally necessitates code 3
modifications. Protection requires intensive testing.
T3 - -
WAF Protection against ID manipulation using ID virtualisation or 1
hidden parameter protection.
P Use of impersonification and delegation. 3
A5 Cross-site T1 Can be solved using specific application architecture. 1
Request Forgery T2 Significant amount of work. Program changes generally 3
(CSRF) required.
T3 - -
WAF Can be prevented using page token or URL encryption. 1
P -
A6.1 Information T1 Tool-supported testing with high test coverage and relevant 2
Leakage focus.
T2 Tool-supported testing with high test coverage and relevant 2
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
focus.
T3 - -
WAF Automatic filtering of comments possible. Site usage 1-2
enforcement can prevent access to existing but
unpublished (unlinked) documents. Traditional examples
are backup files on the web server which contain database
passwords in plain text and whose URL can be guessed by
the attacker.
P Requirement for programmers and authors not to enter any 2
comments. Specifications for the design of error
messages.
A6.2 Improper Error T1 Can be configured declaratively depending on the platform. 1
Handling Can be configured declaratively depending on the platform.
T2 1
T3 Can be configured declaratively depending on the platform. 1/-
WAF Difficult to detect. 2
P - -
A7.1 Broken T1 Link-up to a central access management system with 1
Authentication appropriate security standards
T2 Link-up to a central access management system with 2
appropriate security standards. Program modifications may
be required.
T3 - -
WAF Depends on the abilities of the WAF. A WAF can carry out 2
authentication independent of the application and thus
permit a link-up to a central authentication infrastructure
without changing the application.
P Specifications with regard to password complexity. 2
A7.2 Session T1 On the design level, e.g. using session manager design 2
Management pattern, otherwise numerous options. Amount of
implementation work partially dependent on application
server, see also A7.1, if the session management is carried
out by the access management system.
T2 Can be integrated centrally to a large extent (using filters, 2-3
listeners or hardened server configuration); nevertheless, a
large amount of work in some places; see also A7.1, if the
session management is carried out by the access
management system.
T3 Depends on application server, partially configurable -
• Importance of the web application(s) for the success of the oganization (proportional turnover,
reputation)
• Importance of the loss of data of the web application (customer data, confidential information,
reputation)
• Number of web applications
• Basic legal conditions or industrial standards
• Complexity
• Operating costs
• Performance
• Scalability
The access to a web application can be used as a measure of the extent to which the organization in
posession of the application can promptly carry out or initiate and implement the necessary changes to
the web application, in other words has access to the source code of the application.
A web application in the design phase (see T1 in A5) can be considered as a special case of a web
application with optimum access.
The other extreme, a web application without access is an application consisting of many undocumented
components, for example, whose developer cannot be contacted, and which uses third-party software
products, which are no longer maintained by the manufacturer, or – in case of open source projects -
by the community (see T3 in A5).
Important criteria for determining the degree of access to a web application, are:
• Complete documentation of the architecture and the source code or availability of the developers
of the web application
• Maintenance contracts for all components of the application architecture
• Short error rectification times by the manufacturer for all third-party products used (portals,
frameworks, SAP, etc.).
Other important criteria for each web application are given in the checklist which can be found in the
appendix.
The illustration given below may be useful as a guide in the decision-making process regarding the
benefits of using a WAF:
If an organization has full access to their web applications, the use of a WAF primarily provides a
reduction of the cost of operation – especially due to the additional benefits of a WAF given in A3 as a
central service point, as well as some comparatively easy-to-implement security mechanisms, see A4.
If there is virtually no access to the web applications, the use of a WAF is definitely appropriate as this
is the only way that the relevant security measures can be implemented.
With decreasing access to the web application – and depending on its importance and complexity –
the benefits stemming from the use of a WAF grow rapidly: from a second line of defence to true full
protection of the web application from outside influence, attained by the use of whitelisting. Using a
WAF often results in the least additional work for the required security level.
• Avoidance of financial damage resulting from successful attacks on the web application
• Lower costs for reaching the nescessary protection level for the web application in comparison to
other options
• Savings via the use of central services which are made available by a WAF for multiple web
applications, and therefore no longer have to be implemented or configured in every application.
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
When protecting applications with insufficient access (see A6.2), but which still need to be protected,
the costs of a WAF can either be viewed as a strategic investment, or where realistic, set against the
costs of replacing the application in question.
• Licence costs
• Licence updates / software support
• Project costs for evaluating and introducing a WAF
• (Partial) costs for operating the necessary platform
• Personnel costs for the WAF application manager(s)
• time required in projects for coordination with the WAF application manager.
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
Accordingly, a WAF can be installed in a central infrastructure which is not predicted to change, as a
central infrastructure component, e.g. as a hardware appliance; whereas with an infrastructure which
is still decentral, but which may be growing quickly – for example a large online shop – a distributed
WAF approach, e.g. as a plug-in into the existing web servers, is more appropriate. With regard to the
infrastructure aspects, those WAF products are particularly flexible, which combine an essentially
distributed implementation approach with a central administration point and therefore offer the benefits
of both scenarios.
hat is worth mentioning – and becoming increasingly important with regard to probable future
developments – is the option of hardened infrastructures using virtualisation. When selecting the WAF,
it is particularly important that the WAF can also be integrated seamlessly into a virtualised approach.
A typical example is SSL termination “in front of the web servers”. This is often denied, in particular in
high-security infrastructures, by the existing security guidelines This policy can be maintained by the
use of a suitable WAF, as a plug-in on the web server with the SSL termination still subsequently
being carried out in the web server.
presented by a WAF as a central service point for instance for secure session management, positive
collaboration with application development is required.
In other words: In order to fully exploit the potential of a WAF, it is not sufficient to view the WAF solely
as an infrastructure component.
For this reason, we propose the new role of a WAF application manager – in addition to the role of a
WAF platform manager, who in a similar way to a network firewall platform manager is responsible for the
infrastructure-related aspects of the WAF - for each application which – metaphorically speaking –
represents the bridge between the WAF and the specialist application. This person must have
excellent knowledge of the WAF in order to be able to configure and monitor it for each individual
application. He or she must know the application well to be able to classify and interpret messages
coming from the WAF. A WAF application manager will normally maintain the WAF configuration for
multiple applications. An example would be managing the WAF for all web-based SAP systems, whilst
the shop system is managed by another WAF application manager.
A detailed description of the proposed role model can be found in appendix A8.3.
A7.3 Iterative procedure for implementation – from basic security to full protection
An iterative procedure has been tried and trusted as best practice in the implementation and operation
of WAFs.
7.3.4 Further steps: Full protection of the web applications according to priority
Web applications are fully protected from outiside attack with whitelist rule sets in a step by step
process according to the priority list. This is normally supported by a learning mode in the WAF or a
source code review/penetration test. The WAF application manager, in collaboration with the specialist
application manager, ensures the full availability of the application at all times, including during a
conversion of the rule set.
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
A8 Appendices
The following checklist can be used to evaluate the access that a company has to the web application. Access
to a web application gets better, as more more points are accumulated.
application (not including project very different results, depending on who is doing the
management) in the development counting. Ideally, it would be better to consider the
phase. complexity of the architecture, not the time spent on
implementation,.
Central controller present 3
The architecture of the application
includes a central controller, which
processes all the inputs and outputs of
the application (MVC).
Security framework is used 4 This means mainly that the developers have
The application uses a security considered security aspects as important. Certainly
framework that, among other things, a very positive and important issue, see last point.
provides validators/filters for input and
output..
Security audit has been carried out 2
A security audit/penetration test has
been carried out against the application
and all vulnerabilities detected in the
audit have been rectified.
Developers have been trained in secure 5 Always the most important thing are trained
programming and are experienced. developers!
The introduction of a WAF is normally carried out as part of a project. The decisive factor for a
longterm, successful operation of a WAF, however, is a role model in which the responsibilities of all
parties involved are defined in the overall software development cycle. A WAF has both characteristics
of an infrastructure component, and its behaviour is also highly specific to the application. Its
configuration and behaviour can even vary considerably between different releases of the same
application. The configuration of a WAF is much more complex than that of a traditional firewall. To put
it simply, it no longer suffices to configure a single IP for an application, instead each input field of that
application has to be configured.
In larger IT organisations, operation of the network, to which the firewall belongs, and of the
applications, is carried out by different organizational units, sometimes even by different companies.
Most operating concepts follow this organizational separation with a role concept which makes a clear
distinction between tasks on the infrastructure level (network and operating system) and on the
application level.
As with a firewall, the role of a WAF platform manager is required, who is responsible for the operational
aspects of the WAF. We are proposing the new role of a WAF application manager whos responsibilities
lie between the WAF and the individual application. An application manager is still required. This
manager is not required to have a deeper understanding of the WAF, however
The WAF application manager is the bridge between the WAF and the specialist application. This
person must have excellent knowledge of the WAF to be able to configure it and monitor it for the
individual application. He or she must know the application well to be able to classify and interpret
messages coming from the WAF. A WAF application manager will normally maintain the WAF
OWASP Papers Program
Best Practice: Use of Web Application Firewalls
configuration for multiple applications. An example would be maintaining the WAF for all web-based
SAP systems, whilst the shop system is maintained by another WAF application manager.
This means that, on the one hand the specific requirements for the secure and efficient operation of a
WAF are taken into account, and on the other hand, the traditional roles of infrastructure or platform
manager and application manager remain unchanged within highly structured organisations.
Knowledge:
• Knowledge of the WAF, its operation, administration and the authorisation concept
8.3.2 WAF application manager (per application)
Tasks:
Knowledge:
• In-depth knowledge of the WAF configuration in relation to application-specific security
mechanisms
• Very good knowledge of the behaviour of the application, in particular input, output, uploads,
downloads, character sets, etc.
8.3.3 Application manager
• Operation or development of the application to be protected
• Knowledge of the application architecture and the input fields, provides these to the WAF
application manager.