Manual Chapter : Analyzing security policy status
Applies To:Show Versions
BIG-IQ Centralized Management
Analyzing security policy status
Your Web Application Security policies secure applications from layer 7 web-based vulnerabilities. Application security policies can be implemented and later fine-tuned based on observed traffic patterns and repeated attacks. This allows you to customize your application's protection based on the security required and the acceptable risk in your business environment.
Generating a security audit of your security policy allows you to analyze the current application protection offered, in addition to recommendations for improvement. Once you have generated a security policy audit, you can use the recommendations to perform immediate policy tuning to improve application protection. Any changes can be immediately assessed by the audit and then deployed.
Policy tuning recommendations should meet the specific business needs of your application. If these recommendations do not align with your application needs, they can be ignored.
For more information about the security policy audit, see
Overview of security policy audit.