Manual Chapter : Analyzing security policy status

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 8.0.0
Manual Chapter

Analyzing security policy status

Your Web Application Security policies secure applications from layer 7 web-based vulnerabilities. Application security policies can be implemented and later fine-tuned based on observed traffic patterns and repeated attacks. This allows you to customize your application's protection based on the security required and the acceptable risk in your business environment.
Generating a security audit of your security policy allows you to analyze the current application protection offered, in addition to recommendations for improvement. Once you have generated a security policy audit, you can use the recommendations to perform immediate policy tuning to improve application protection. Any changes can be immediately assessed by the audit and then deployed.
Policy tuning recommendations should meet the specific business needs of your application. If these recommendations do not align with your application needs, they can be ignored.
For more information about the security policy audit, see
Overview of security policy audit
.