“Hey Kristine, our WAF says that we are under DDoS attack. Fortunately, it has blocked all the incoming traffic from Randomland,” – smirking Ralph said.
“Jesus. That’s our Big Sale Day in Randomland and your WAF just ruined it, again,” she shouted.
This Randomland scenario presents one of the many unfortunate everyday stories told in companies all across the globe. According to Ponemon Institute, companies are losing over $1.3 million to false positives every year, which also totals to over 20, 000 hours of dedicated manpower assigned for the job of dealing with these false positives.
While there is no doubt that digitalization- in every possible way- is the only way towards growth in the near future, the question here is if we are really prepared with security logic. Over 15 years have passed since the first specialized app firewall was launched by AppShield, but still, a large number of security service providers have failed to solve the false-positive paradox. To date, false-positive remain the most notorious loophole in their application shielding mechanism.
It’s simply a false alarm caused by a flaw in logic. Think of a watchman whose job is to keep suspicious individuals out of your property, but who instead denies access to your family members due to some misplaced understanding of what you told him. Wouldn’t that frustrate you to the level of firing that watchman? That’s exactly what you should do with a WAF loading false alarms.
If you dig into the technical aspect of the problem, WAF or a Web Application Firewall follows a set of rules to distinguish threats from real interaction with the server. It basically shields your application from anything malicious. Often due to flawed logic or generic signature writing, WAF is unable to perform as it should, containing genuine interactions with the server.
Not a surprise that the repercussions of such false positives are many. The cost of fixing the issue is high, but it is nothing compared to the customers and leads lost during the process.
Today, counter-threat mechanisms including web application firewalls are not just any other paraphernalia to security but are rather the foundation. It is a place around which every online business needs to create security. A powerful web application firewall has to be there.
Although most businesses understand this need, unfortunately, they also accept false positives as a recurring part of the whole scenario. Here’s why it shouldn’t be that way.
False Positives are generated by the majority of the WAFs as a byproduct of generic core rule sets. This ends up being the old “80/20 rule” of security where you will instantly get coverage for about 80% of the problem. The issue then moves towards the remaining 20%. This is where, majority of the WAFs run into both false positives and false negatives, as there is no way to know exactly what web application is going to be run behind it. False-positive issues begin at the root level of WAF deployment and often become just too complex to control. One rule is set to counter others and before you know there is a huge mess out of it.
How a WAF handles false positives has everything to do with its accuracy and its abilities in blocking accurately your highest risks first. Going back to the security guard analogy, if there is a known threat from a person who should not be allowed to enter your premises, some sort of identification like a photograph will help the watchman perform better. Of course, then there can be more advanced options like identification information, biometrics, and DNA fingerprinting. Additionally, WAF’s accuracy and efficiency have everything to do with its security effectiveness too. That’s precisely why we test, monitor, and customize our WAF rule sets to great depths and keep Indusface WAF ahead of the curve and promise zero false positives. Right from the earlier stages of development, we knew that relying just on automated and ‘generic’ systems is not going to be enough. We rely on the “24X7 assess and amend” approach as opposed to the “rip and replace”. This tailor-made approach allows us to provide not just better, but smarter protection.
This post was last modified on May 19, 2021 17:06
Explore crucial tactics like Asset Inventory, Patch Management, Access Control & Authentication, and additional best… Read More
Delve into the data privacy questions including consent protocols, data minimization strategies, user rights management,… Read More
Secure Node.js APIs using best practices: Employ proper HTTP methods, robust authentication, and API-specific security… Read More