Application Security Policy Templates in F5 ASM
F5 ASM provides various methods to create and configure security policies tailored to different application types, traffic patterns, and security needs. Here's a breakdown of the approaches mentioned:
1. Create a Security Policy Automatically
Options: Fundamental, Enhanced, Comprehensive.
How It Works:
The Real Traffic Policy Builder automatically creates a security policy by analyzing live application traffic.
It evaluates:
Patterns in requests.
User behavior.
The structure and intended behavior of the application.
Timeframe: This process may take several days depending on:
The number of requests sent.
The complexity and size of the website.
Limitations:
This method offers limited ability to fine-tune the resulting policies.
It’s intended for quick deployment without requiring detailed manual intervention.
2. Create a Security Policy Manually
Methods:
Rapid Deployment Policy (RDP):
A simplified, manual setup method designed for faster implementation.
Focuses on immediate protection while allowing manual adjustments over time.
Pre-defined Templates:
Application-ready security policies tailored for specific platforms or applications (e.g., SharePoint, WordPress).
Templates are pre-configured with baseline rules and require less manual setup.
Advantages:
Provides granular control for administrators to fine-tune the policy to the application’s needs.
Ideal for experienced users who need precise configurations.
3. Create a Security Policy for API-Based Applications
Focus: Protection for APIs, including REST APIs and GraphQL.
How It Works:
The system uses predefined configurations to create a security policy tailored to API behavior.
Protects against common API-specific threats such as:
Injection attacks.
Parameter tampering.
Schema or query violations (e.g., in GraphQL).
Additional Features:
Offers learning suggestions to refine security policies further.
Supports protection for XML/Web Services by validating schema, content types, and behaviors.
4. Create a Security Policy Using 3rd Party Vulnerability Assessment Tool Output
Purpose:
Integrates results from external vulnerability scanning tools to build a targeted security policy.
Supported Tools:
Examples include:
WhiteHat Sentinel
IBM Rational AppScan
Cenzic Hailstorm
QualysGuard
HP WebInspect
How It Works:
The vulnerability scanner identifies weaknesses in the application.
The output is imported into ASM, which automatically adjusts the security policy to mitigate identified risks.
Advantages:
Addresses known vulnerabilities effectively.
Ensures that policies are directly aligned with the specific risks present in the application.
Comparison of the Methods
Method
Automation Level
Fine-Tuning Options
Use Case
Automatic (Real Traffic Policy)
High
Limited
Quick protection with minimal intervention.
Manual (RDP or Templates)
Medium
High
Granular control and tailored configurations.
API-Based Applications
Medium
High
API-specific threats and schema validation.
3rd Party Vulnerability Tool
High
Moderate (based on output)
Targeted mitigation of known vulnerabilities.
Last updated