Manual Chapter :
Analyzing security policy status
Applies To:
Show Versions
BIG-IQ Centralized Management
- 8.0.0
Analyzing security policy status
Your Web Application Security policies secure applications from layer 7
web-based vulnerabilities. Application security policies can be implemented and later
fine-tuned based on observed traffic patterns and repeated attacks. This allows you to customize your
application's protection based on the security required and the acceptable
risk in your business environment.
Generating a security audit of your security policy allows you to analyze the current
application protection offered, in addition to recommendations for improvement. Once you
have generated a security policy audit, you can use the recommendations to perform
immediate policy tuning to improve application protection. Any changes can be
immediately assessed by the audit and then deployed.
Policy tuning recommendations should meet the specific business needs of your
application. If these recommendations do not align with your application needs, they can
be ignored.
For more information about the security policy audit, see
Overview of security
policy audit
.