CSCv7|18.10

Title

Deploy Web Application Firewalls (WAFs)

Description

Protect web applications by deploying web application firewalls (WAFs) that inspect all traffic flowing to the web application for common web application attacks. For applications that are not web-based, specific application firewalls should be deployed if such tools are available for the given application type. If the traffic is encrypted, the device should either sit behind the encryption or be capable of decrypting the traffic prior to analysis. If neither option is appropriate, a host-based web application firewall should be deployed.

Reference Item Details

Category: Application Software Security

Audit Items

View all Reference Audit Items

NamePluginAudit Name
4.4.4 Apply Application Control Security Profile to PoliciesFortiGateCIS Fortigate 7.0.x Level 1 v1.2.0
6.6 Ensure ModSecurity Is Installed and EnabledUnixCIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware
6.6 Ensure ModSecurity Is Installed and EnabledUnixCIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware
6.6 Ensure ModSecurity Is Installed and EnabledUnixCIS Apache HTTP Server 2.4 L2 v2.1.0
6.6 Ensure ModSecurity Is Installed and EnabledUnixCIS Apache HTTP Server 2.2 L2 v3.6.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesUnixCIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesUnixCIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesUnixCIS Apache HTTP Server 2.4 L2 v2.1.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesUnixCIS Apache HTTP Server 2.2 L2 v3.6.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.4 L2 v2.1.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.2 L2 v3.6.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.2 L2 v3.6.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdUnixCIS Apache HTTP Server 2.4 L2 v2.1.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelUnixCIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelUnixCIS Apache HTTP Server 2.2 L2 v3.6.0
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelUnixCIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware
6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelUnixCIS Apache HTTP Server 2.4 L2 v2.1.0