Features
Category | Description |
Service configuration | WAF protects websites by monitoring and filtering HTTP and HTTPS traffic. |
Web application protection | Protection against common web application attacks | Protection for web applications against the following common Open Web Application Security Project (OWASP) attacks: SQL injection attacks, cross-site scripting (XSS) attacks, webshell uploads, backdoor attacks, command injection attacks, illegal HTTP requests, common web server vulnerabilities, cross-site request forgery (CSRF) attacks, unauthorized access to core files, path traversals, and website scanning. Hiding of origin IP addresses: WAF hides origin IP addresses. This prevents attackers from bypassing WAF to attack origin servers. Regular and prompt patching of zero-day vulnerabilities: WAF provides patches at the earliest opportunity to protect websites. User-friendly monitoring mode: You can enable this mode to monitor new website services. WAF sends an alert when suspicious traffic that matches specified protection rules is detected. WAF does not block the traffic due to the possibility of false positives.
|
Precise protection | WAF can parse HTTP data in common formats. The HTTP data includes header, form, multipart, JSON, and XML data. WAF can decode data that is encoded by using the following methods: URL encoding, JavaScript Unicode encoding, HEX encoding, HTML entity encoding, Java serialization encoding, PHP serialization encoding, Base64 encoding, UTF-7 encoding, UTF-8 encoding, and nested encoding. WAF can preprocess data to provide more fine-grained and accurate data sources for detection engines at the upper layer. The preprocessing mechanisms include space compression, comment pruning, and special character processing. WAF can detect data in complex formats. WAF supports complex detection logic to prevent false positives caused by excessive detection operations. This helps reduce the false positive rate. WAF also supports adaptive decoding of data encoded in different formats to prevent bypassing.
|
Protection against HTTP flood attacks | WAF limits the frequency of requests from a specific IP address by using various methods, such as CAPTCHA verification and redirection for authentication. To protect against a large number of slow HTTP attacks, WAF executes precise protection rules based on statistical data, such as the distribution of status codes, distribution of requested URLs, and identification of abnormal HTTP Referer headers and User-Agent characteristics. WAF takes full advantage of Alibaba Cloud big data security solutions to build analysis models for threat intelligence and trusted access. The models can be used to identify malicious requests.
|
Fine-grained access control | In the WAF console, you can use a combination of different HTTP fields, such as the IP, URL, Referer, and User-Agent fields, to configure protection rules and implement fine-grained access control. You can also configure custom protection rules to provide protection in various scenarios, such as hotlink protection and website backend protection. This module can be used together with other security modules, such as web security and HTTP flood protection, to build a multi-layer protection architecture. This way, WAF can differentiate between trusted and malicious traffic in a fine-grained manner.
|
Virtual patching | Before the patches for web application vulnerabilities are released or installed, you can adjust web protection rules to protect your services against new vulnerabilities. |
Attack event management | WAF allows you to manage attack events based on statistical data, such as attack events, attack traffic, and attack scales. |
Flexibility and reliability | Load balancing: WAF can provide services in cluster mode. WAF uses multiple servers to balance loads and supports different scheduling algorithms. Smooth and elastic scaling: You can add servers to or remove servers from a cluster to adjust the WAF service capability based on your business requirements. Elimination of single points of failure (SPOFs): If a WAF node fails or is being repaired, WAF can continue to provide services.
|
For more information, visit the product page of Web Application Firewall.
Benefits
Benefit | Description |
More than 10 years of web security experience | WAF is developed based on more than 10 years of web security experience within the Alibaba Group and provides the same security protection enjoyed by Tmall, Taobao, Alipay, and other well-known applications. A professional security team provides security services for you. WAF defends against known OWASP vulnerabilities and constantly fixes known vulnerabilities.
|
Protection against HTTP flood and crawler attacks | WAF mitigates HTTP flood attacks. WAF defends against web crawlers to prevent excessive network resource consumption. WAF detects and blocks malicious requests that may affect availability, compromise response latency, or consume excessive bandwidth, database, SMS, or API resources. WAF allows you to configure custom protection rules for various business scenarios.
|
Integration with big data capabilities | WAF can defend against hundreds of millions of attacks every day. WAF provides an IP address library that contains a large number of IP addresses. WAF analyzes a wide range of real cases to obtain the patterns, methods, and signatures of various common network attacks. WAF is continuously integrated with advanced technologies for big data analytics.
|
Ease of use and reliability | You can activate and configure WAF within 5 minutes. You do not need to install software or hardware or adjust routing configurations. Protection clusters are used to prevent SPOFs and redundancy. WAF provides high traffic processing performance.
|
Scenarios
WAF is suitable for all users on and outside Alibaba Cloud. WAF helps protect web applications in industries such as finance, e-commerce, online-to-offline (O2O), Internet Plus, gaming, public services, and insurance.
Note If you use WAF to protect your services, you must add the domain names of your services to WAF. You cannot add IP addresses to WAF.
Usage
After you purchase a WAF instance, you can add the domain name of your website to WAF in CNAME record mode or transparent proxy mode.
CNAME record mode
You can add your website to WAF in CNAME record mode regardless of whether your origin server is deployed on the cloud or on-premises.
In CNAME record mode, you must add the domain name of the website that you want to protect to WAF and change the DNS record of the domain name. This way, traffic destined for the website is forwarded to and protected by WAF. For more information, see Add a domain name to WAF.
Transparent proxy mode
If your origin server is an Elastic Compute Service (ECS) instance or a backend server of an Internet-facing Server Load Balancer (SLB) instance, you can add your website in CNAME record mode or transparent proxy mode. The transparent proxy mode is based on cloud-native technologies.
In transparent proxy mode, you need to only add the domain name of the website that you want to protect to WAF. You do not need to change the DNS record of the domain name. This way, traffic destined for the website is forwarded to and protected by WAF. For more information, see Transparent proxy mode.
Compliance certifications
WAF has passed various authoritative certifications, including ISO 9001, ISO 20000, ISO 22301, ISO 27001, ISO 27017, ISO 27018, ISO 27701, ISO 29151, BS 10012, Cloud Security Alliance (CSA) STAR certification, Cybersecurity in China Multi-level Protection Scheme (MLPS 2.0) Level III, Service Organization Control (SOC) 1, SOC 2, SOC 3, Cloud Computing Compliance Controls Catalog (C5), Green Finance Certification Scheme developed by Hong Kong Quality Assurance Agency (HKQAA), Outsourced Service Provider's Audit Report (OSPAR), and Payment Card Industry Data Security Standard (PCI DSS).