Manual Chapter :
Security Policy Analyzer recommendations
Applies To:
Show Versions
BIG-IQ Centralized Management
- 8.0.0
Security Policy Analyzer recommendations
The following is a list of policy tuning recommendations to
improve your Web Application Security policy's protection. These suggestions are based on
rule violations detected by policy learning. Recommendations are based on
current policy configuration and traffic analysis. You can either approve or ignore these
suggestions based on your application protection requirements.
General policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Policy enforcement not set to block attacks | The policy's enforcement mode is not set to blocking mode,
therefore the policy will not block detected attacks. To protect the
application from attacks, change the policy enforcement mode to
blocking. | Critical | Enforcement mode |
Policy application language not set | The application language setting controls how WAF interprets
incoming requests. The application language should be set to a
specific type so WAF can parse the data correctly and enable certain
configuration functions that may be limited. | Critical | Application language mode |
Attack signature update file on policy host device is more than
90 days old | F5 offers updates on the attack signatures file every few weeks
to keep up-to-date with threat enforcement. Regularly update the
attack signature file to protect applications against the latest web
application threats. | Warning | Signature Update |
Attack signature update file on policy host device is more than
180 days old | F5 offers updates on the attack signatures file every few weeks
to keep up-to-date with threat enforcement. Regularly update the
attack signature file to protect applications against the latest web
application threats. | Critical | Signature Update |
Policy is not attached to a VS/Application | Unused policies (not including parent policies) become
unnecessary configuration objects in BIG-IQ. F5 recommends to
regularly review whether unused policies should be
discarded. | Info | Unused Policy |
Mask Credit Card Numbers in request log set to disabled | Enable Mask Credit Card Number setting to avoid sensitive data
leakage from logs. | Info | Geo Location |
Installed geolocation file timestamp on policy host device is
more than 6 months old | F5 offers updates on the geolocation file. Regularly update the
geolocation file to keep the system settings up to date. | Warning | Geo Location |
Signature policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Policy does not include a signature set | There are no signature sets attached to your policy. A signature
set is a group of related attack signatures attached to a policy.
The application signature set is used by the policy to detect, log,
and (if applicable) block known attack signatures to your
application. | Critical | Signature set Assignment |
Policy includes more than 15 signature sets | Ensure that all signature sets attached to your policy are
required. Multiple signature sets may lead to a higher rate of false
positives against valid traffic. While some signature sets can be
overlapped, as signatures are can be shared across signature sets,
high numbers of signature sets suggest that some unnecessary
signatures are enabled. | Warning | Signature set large list |
Policy signature set is not in blocking mode | Ensure that the signature set's default actions are set to block
detected signatures. A signature set that is not set to block will
not protect applications against attack signatures detected by the
policy. To block traffic, policy enforcement mode must also be set
to blocking. | Critical | Signature set enforcement mode |
Policy signature set is not in learning mode | Ensure that the signature set's default actions are set to learn
detected signatures. A signature set that is attached to a policy,
but is not set to learn, will not perform an analysis on the
requests that match attack signatures included in the signature set. | Warning | Attack signature-set learn mode |
Policy signature set is not in alarm mode | Ensure that the signature set's default actions are set to alarm
when requests match detected signatures. A signature set that is
attached to a policy, but is not set to alarm, will not log detected
signatures from this signature set in the security events log. | Warning | Attack signature-set alarm mode |
More than 10% of attack signatures are disabled | Ensure that all disabled signatures are still required in your
signature sets. A high percent of disabled attack signatures might
lead to an increase false negatives. | Warning | Attack signatures are in disabled state |
More than 10% of attack signatures are in staging | Enable attack signature to ensure the policy can detected block
violations. | Warning | Attack signature in staging state |
Entities policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Policy Parameters are ready to be enforced | There are Parameters in the policy that are ready to be
enforced. | Warning | Entities status |
Policy File Types are ready to be enforced | There are File Types in the policy that are ready to be
enforced. | Warning | Entities status |
Policy HTTP/S URLs are ready to be enforced | There are HTTP/S URLs in the policy that are ready to be
enforced. | Warning | Entities status |
Policy Web Socket WS/S URLs are ready to be enforced | There are Web Socket WS/S URLs in the policy that are ready to be
enforced. | Warning | Entities status |
Policy Cookies are ready to be enforced | There are Cookies in the policy that are ready to be
enforced. | Warning | Entities status |
Policy Signatures are ready to be enforced | There are Signatures in the policy that are ready to be
enforced. | Warning | Entities status |
Policy contains more than 100 parameters | Consider revising the number of entities required in your policy.
Maintaining a large list of entities may require heavy operational
overhead. | Info | Parameter list size |
Policy contains more than 100 URLs | Consider revising the number of entities required in your policy.
Maintaining a large list of entities may require heavy operational
overhead. | Info | URL list size |
Policy contains more than 100 allowed file types | Consider revising the number of entities required in your policy.
Maintaining a large list of entities may require heavy operational
overhead. | Warning | file type list size |
Parameter is not enforced | Ensure that the parameter is in an enforcement mode that can
block detected attacks. | Warning | staging mode - parameter |
File type is not enforced | Ensure that the file type is in an enforcement mode that can
block detected attacks. | Warning | staging mode - file type |
URL is in not enforced | Ensure that the URL is in an enforcement mode that can block
detected attacks. | Warning | staging mode - URL |
WebSocket URL is not enforced | Ensure that the URL is in an enforcement mode that can block
detected attacks. | Warning | staging mode - WebSocket URL |
Cookie is not enforced | Ensure that the cookie is in an enforcement mode that can block
detected attacks. | Warning | staging mode - Cookie |
File Types learning mode set to "Always" | Consider changing the learning mode for file types. Learning mode
"Always" creates a large list of entities. Maintaining a large list
of entities requires a heavy operation overhead and is prone to
false positives. | Warning | file type learn mode |
Parameters learning mode set to "Always" | Consider changing the learning mode for parameters. Learning mode
"Always" creates a large list of entities. Maintaining a large list
of entities requires a heavy operation overhead and is prone to
false positives. | Warning | parameters learn mode |
URLs learning mode set to "Always" | Consider changing the learning mode for URLs. Learning mode
"Always" creates a large list of entities. Maintaining a large list
of entities requires a heavy operation overhead and is prone to
false positives. | Warning | URLs learn mode |
HTTP/S URL does not check attack signatures | Enable attack signature enforcement for this URL to enforce
protection against detected signatures. | Warning | URL check signatures status |
Header does not check attack signatures | Enable attack signature enforcement for this header to enforce
protection against detected signatures. | Warning | Header check signatures status |
Cookie does not check attack signatures | Enable attack signature enforcement for this cookie to enforce
protection against detected signatures. | Warning | Cookie check signatures status |
Policy tuning suggestion score is 100% | Review policy builder suggestions and ensure to tune the policy
suggestions once they reach a score of 100%. | Warning | Check suggestions score |
HTTP DELETE method is allowed | F5 recommends not to allow HTTP DELETE method, if possible.
Remove DELETE from the Methods list, unless the method is required
by application users. | Warning | HTTP Methods |
Modified cookie violation protection is enabled without enforced
cookie configured | The policy is configured to protect against Modified ASM Cookies
violations. Configure at least one enforced cookie to the Cookies
list to protect against this violation. | Info | Modified Cookies |
Violations policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Data Guard disabled | Enable data guard settings to protect against a sensitive data
leakage in the server response | Info | Data Guard status |
Default request content profile not specified | Each allowed HTTP URL's settings should contain at least one
content profile to process the request based on the traffic type.
Consider using default content profiles. | Critical | File Type Header Based Content Profiles |
CSRF Protection violation is enabled with CSRF Protection
disabled | The policy is configured to protect against illegal file type
violations. From the Disallowed File Types list, specify which file
types to protect against detected violations. | Critical | Empty Disallow File Type List |
CSRF Protection violation is enabled with CSRF Protection
disabled | Enable the Sensitive Parameter setting to avoid sensitive data
leakage from logs. | Info | Sensitive Parameters |
Access to Disallowed Geolocation violation enabled with no
countries selected | The policy is configured to protect against Geolocation
violations. Add countries to the disallow geolocation list to block
requests from a specified origin. | Warning | Access from disallowed Geolocation |
Brute Force enabled without login page configured | Configure at least one login page to enable Brute Force Attack
Prevention. | Info | Brute Force |
CSRF Protection violation is enabled with CSRF Protection
disabled | The policy is configured to protect against CSRF violations. To
protect against CSRF violations, enable CSRF Protection. | Info | CSRF enforcement |
Disallowed File Upload Content Detected violation enabled without
File Upload data type parameter configured | Configure at least one parameter with a File Upload data
type. | Info | File Upload |
Disallowed File Upload Content Detected violation enabled with
File Upload data type parameter. Disallow File upload of Executables
is disabled on the parameter. | F5 recommends enabling (Disallow) the setting Disallow File
upload of Executables on the parameter to improve the security
level. | Info | File Upload |