Manual Chapter :
Analyzing Security Policies
Applies To:
Show VersionsBIG-IQ Centralized Management
- 8.3.0, 8.2.0, 8.1.0
Analyzing Security Policies
Analyzing security policy status
Your Web Application Security policies secure applications from layer 7
web-based vulnerabilities. Application security policies can be implemented and later
fine-tuned based on observed traffic patterns and repeated attacks. This allows you to customize your
applications' protection based on the security required and the acceptable
risk in your business environment.
Generating a security audit of your security policy allows you to analyze the current
application protection offered, in addition to recommendations for improvement. Once you
have generated a security policy audit, you can use the recommendations to perform
immediate policy tuning to improve application protection. Any changes can be
immediately assessed by the audit and then deployed.
Policy tuning recommendations should meet the specific business needs of your
application. If these recommendations do not align with your application needs, they can
be ignored.
For more information about the security policy audit, see
Overview of security
policy audit
.Generate a security policy audit
When analyzing a Web Application Security policy, ensure that it is a child policy.
Analyze the protection status and application
security provided by your Web Application Security policy. Generate an audit that allows
you to view the policy's overall protection capabilities and a list of system-provided
recommendations for improvement.
- Go to.
- Click the check box next to the name of the security policy you would like to audit.You are not required to select a policy at this stage.
- ClickMoreand selectPolicy Analyzer.If you have not yet selected a policy, or you would like to analyze a different policy, select a security policy from SECURITY POLICY area in the upper left side of the screen. Once you select a policy, clickAnalyze.
- To save a local copy of the the security audit, clickExportto download a CSV file of the information in the audit.
You have now generated a security policy audit, which
will allow you to asses the current status of the policy's application protection
capabilities.
You can use this audit to enable, ignore, and/or
deploy policy recommendations listed on this screen. See
Overview of security policy audit
for more information.Overview of security policy audit
The security policy audit allows you to evaluate and edit a
security policy based on system-provided recommendation. In addition, you can use the audit
to analyze policy changes, deploy changes, ignore recommendations, and export the audit
results. The image below provides an overview of the information and available actions
within the Policy Analyzer audit. For more information about the system-provided
recommendations, see section
Security Policy Analyzer recommendations
.Policy Summary
The policy analyzer audit provides a summary of pending recommendations. Application protection is evaluated based on the severity and number of pending recommendations. As shown in the image below, the analyzed policy has a security score of "C" due to a number of recommendations from various categories. Use the audit to evaluate whether or not to edit your policy based on the system-provided recommendations.
Edit Policy
Edit the policy based on the system-provided recommendations. By clicking on the text
in the
Recommendation
column, you can go directly to the
configuration area that will allow you to implement policy or system configuration
changes. Ignore Recommendations
If the system-provided policy recommendations do not meet your application's
protection requirements, you can select the recommendation's row and click
Ignore
. This action can change the system assessment of your overall security
score, once you review or re-analyze the policy.Review Policy Edits
If you have saved changes to the policy, or the objects configured to the policy, you
can perform a new audit before you deploy changes. To do so, select the
Refresh
option from the SECURITY
POLICY
area in the summary screen. The summary bar and
recommendations adjusts the policy analysis according to changes. Deploy Policy Edits
If you would like to deploy policy changes, select the
Deploy
option from the SECURITY POLICY
area in the summary screen.
This will immediately deploy changes to BIG-IP devices associated with the policy.
Policy security score
In the Security Analyzer screen, the policy's security score indicates the number of outstanding system recommendations to improve application protection. Each score is based on the number of pending recommendations in each severity. If a policy surpasses the threshold for the number of outstanding recommendations of any severity, the system updates the security score.
Security Score | Policy Status | Score Criteria (based on number of recommendations) |
---|---|---|
A | Good | 0 Critical 0-2 Warning 0-14 Info |
B | Moderate | 0-1 Critical 0-6 Warning 0-29 Info |
C | Moderate | 0-4 Critical 0-14 Warning 0-59 Info |
D | Moderate-Bad | 0-9 Critical 0-24 Warning 0-99 Info |
E | Bad-Moderate | 0-14 Critical 0-44 Warning 0-149 Info |
F | Bad | 0-15 (or more) Critical 0-45(or more) Warning 0-150 (or more) Info |
Security Policy Analyzer recommendations
The following is a list of policy tuning recommendations to
improve your Web Application Security policy's protection. These suggestions are based on
rule violations detected by policy learning. Recommendations are based on
current policy configuration and traffic analysis. You can either approve or ignore these
suggestions based on your application protection requirements.
General policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Policy enforcement not set to block attacks | The policy's enforcement mode is not set to blocking mode,
therefore the policy will not block detected attacks. To protect the
application from attacks, change the policy enforcement mode to
blocking. | Critical | Enforcement mode |
Policy application language not set | The application language setting controls how WAF interprets
incoming requests. The application language should be set to a
specific type so WAF can parse the data correctly and enable certain
configuration functions that may be limited. | Critical | Application language mode |
Attack signature update file on policy host device is more than
90 days old | F5 offers updates on the attack signatures file every few weeks
to keep up-to-date with threat enforcement. Regularly update the
attack signature file to protect applications against the latest web
application threats. | Warning | Signature Update |
Attack signature update file on policy host device is more than
180 days old | F5 offers updates on the attack signatures file every few weeks
to keep up-to-date with threat enforcement. Regularly update the
attack signature file to protect applications against the latest web
application threats. | Critical | Signature Update |
Policy is not attached to a VS/Application | Unused policies (not including parent policies) become
unnecessary configuration objects in BIG-IQ. F5 recommends to
regularly review whether unused policies should be
discarded. | Info | Unused Policy |
Mask Credit Card Numbers in request log set to disabled | Enable Mask Credit Card Number setting to avoid sensitive data
leakage from logs. | Info | Geo Location |
Installed geolocation file timestamp on policy host device is
more than 6 months old | F5 offers updates on the geolocation file. Regularly update the
geolocation file to keep the system settings up to date. | Warning | Geo Location |
Signature policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Policy does not include a signature set | There are no signature sets attached to your policy. A signature
set is a group of related attack signatures attached to a policy.
The application signature set is used by the policy to detect, log,
and (if applicable) block known attack signatures to your
application. | Critical | Signature set Assignment |
Policy includes more than 15 signature sets | Ensure that all signature sets attached to your policy are
required. Multiple signature sets may lead to a higher rate of false
positives against valid traffic. While some signature sets can be
overlapped, as signatures are can be shared across signature sets,
high numbers of signature sets suggest that some unnecessary
signatures are enabled. | Warning | Signature set large list |
Policy signature set is not in blocking mode | Ensure that the signature set's default actions are set to block
detected signatures. A signature set that is not set to block will
not protect applications against attack signatures detected by the
policy. To block traffic, policy enforcement mode must also be set
to blocking. | Critical | Signature set enforcement mode |
Policy signature set is not in learning mode | Ensure that the signature set's default actions are set to learn
detected signatures. A signature set that is attached to a policy,
but is not set to learn, will not perform an analysis on the
requests that match attack signatures included in the signature set. | Warning | Attack signature-set learn mode |
Policy signature set is not in alarm mode | Ensure that the signature set's default actions are set to alarm
when requests match detected signatures. A signature set that is
attached to a policy, but is not set to alarm, will not log detected
signatures from this signature set in the security events log. | Warning | Attack signature-set alarm mode |
More than 10% of attack signatures are disabled | Ensure that all disabled signatures are still required in your
signature sets. A high percent of disabled attack signatures might
lead to an increase false negatives. | Warning | Attack signatures are in disabled state |
More than 10% of attack signatures are in staging | Enable attack signature to ensure the policy can detected block
violations. | Warning | Attack signature in staging state |
Entities policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Policy Parameters are ready to be enforced | There are Parameters in the policy that are ready to be
enforced. | Warning | Entities status |
Policy File Types are ready to be enforced | There are File Types in the policy that are ready to be
enforced. | Warning | Entities status |
Policy HTTP/S URLs are ready to be enforced | There are HTTP/S URLs in the policy that are ready to be
enforced. | Warning | Entities status |
Policy Web Socket WS/S URLs are ready to be enforced | There are Web Socket WS/S URLs in the policy that are ready to be
enforced. | Warning | Entities status |
Policy Cookies are ready to be enforced | There are Cookies in the policy that are ready to be
enforced. | Warning | Entities status |
Policy Signatures are ready to be enforced | There are Signatures in the policy that are ready to be
enforced. | Warning | Entities status |
Policy contains more than 100 parameters | Consider revising the number of entities required in your policy.
Maintaining a large list of entities may require heavy operational
overhead. | Info | Parameter list size |
Policy contains more than 100 URLs | Consider revising the number of entities required in your policy.
Maintaining a large list of entities may require heavy operational
overhead. | Info | URL list size |
Policy contains more than 100 allowed file types | Consider revising the number of entities required in your policy.
Maintaining a large list of entities may require heavy operational
overhead. | Warning | file type list size |
Parameter is not enforced | Ensure that the parameter is in an enforcement mode that can
block detected attacks. | Warning | staging mode - parameter |
File type is not enforced | Ensure that the file type is in an enforcement mode that can
block detected attacks. | Warning | staging mode - file type |
URL is in not enforced | Ensure that the URL is in an enforcement mode that can block
detected attacks. | Warning | staging mode - URL |
WebSocket URL is not enforced | Ensure that the URL is in an enforcement mode that can block
detected attacks. | Warning | staging mode - WebSocket URL |
Cookie is not enforced | Ensure that the cookie is in an enforcement mode that can block
detected attacks. | Warning | staging mode - Cookie |
File Types learning mode set to "Always" | Consider changing the learning mode for file types. Learning mode
"Always" creates a large list of entities. Maintaining a large list
of entities requires a heavy operation overhead and is prone to
false positives. | Warning | file type learn mode |
Parameters learning mode set to "Always" | Consider changing the learning mode for parameters. Learning mode
"Always" creates a large list of entities. Maintaining a large list
of entities requires a heavy operation overhead and is prone to
false positives. | Warning | parameters learn mode |
URLs learning mode set to "Always" | Consider changing the learning mode for URLs. Learning mode
"Always" creates a large list of entities. Maintaining a large list
of entities requires a heavy operation overhead and is prone to
false positives. | Warning | URLs learn mode |
HTTP/S URL does not check attack signatures | Enable attack signature enforcement for this URL to enforce
protection against detected signatures. | Warning | URL check signatures status |
Header does not check attack signatures | Enable attack signature enforcement for this header to enforce
protection against detected signatures. | Warning | Header check signatures status |
Cookie does not check attack signatures | Enable attack signature enforcement for this cookie to enforce
protection against detected signatures. | Warning | Cookie check signatures status |
Policy tuning suggestion score is 100% | Review policy builder suggestions and ensure to tune the policy
suggestions once they reach a score of 100%. | Warning | Check suggestions score |
HTTP DELETE method is allowed | F5 recommends not to allow HTTP DELETE method, if possible.
Remove DELETE from the Methods list, unless the method is required
by application users. | Warning | HTTP Methods |
Modified cookie violation protection is enabled without enforced
cookie configured | The policy is configured to protect against Modified ASM Cookies
violations. Configure at least one enforced cookie to the Cookies
list to protect against this violation. | Info | Modified Cookies |
Violations policy settings
Rule Description | Recommendation | Severity | Sub Section |
---|---|---|---|
Data Guard disabled | Enable data guard settings to protect against a sensitive data
leakage in the server response | Info | Data Guard status |
Default request content profile not specified | Each allowed HTTP URL's settings should contain at least one
content profile to process the request based on the traffic type.
Consider using default content profiles. | Critical | File Type Header Based Content Profiles |
CSRF Protection violation is enabled with CSRF Protection
disabled | The policy is configured to protect against illegal file type
violations. From the Disallowed File Types list, specify which file
types to protect against detected violations. | Critical | Empty Disallow File Type List |
CSRF Protection violation is enabled with CSRF Protection
disabled | Enable the Sensitive Parameter setting to avoid sensitive data
leakage from logs. | Info | Sensitive Parameters |
Access to Disallowed Geolocation violation enabled with no
countries selected | The policy is configured to protect against Geolocation
violations. Add countries to the disallow geolocation list to block
requests from a specified origin. | Warning | Access from disallowed Geolocation |
Brute Force enabled without login page configured | Configure at least one login page to enable Brute Force Attack
Prevention. | Info | Brute Force |
CSRF Protection violation is enabled with CSRF Protection
disabled | The policy is configured to protect against CSRF violations. To
protect against CSRF violations, enable CSRF Protection. | Info | CSRF enforcement |
Disallowed File Upload Content Detected violation enabled without
File Upload data type parameter configured | Configure at least one parameter with a File Upload data
type. | Info | File Upload |
Disallowed File Upload Content Detected violation enabled with
File Upload data type parameter. Disallow File upload of Executables
is disabled on the parameter. | F5 recommends enabling (Disallow) the setting Disallow File
upload of Executables on the parameter to improve the security
level. | Info | File Upload |