Are Custom Rules for WAF Quite Resource-Intensive?

0
8
Asked By CuriousExplorer85 On

I'm looking to implement custom rules for my Application Gateway Web Application Firewall (WAF) policy. Specifically, I want to exclude certain URIs from some of the anomaly scoring related to OWASP SQL injection checks since we're seeing a lot of false positives. However, I'm concerned that using custom rules might mean checking every request against these rules, which could be really resource-intensive. Has anyone here had experience with this? Did implementing custom rules lead to significant computational issues?

3 Answers

Answered By SkepticalCoder77 On

I'm not entirely sure what you mean by computationally expensive. From what I know, it doesn't add extra cost and any impact on performance is minimal. We have a bunch of custom exceptions, and while it's more work to sift through logs, we've never had performance issues. For us, it works better to ignore SQL rules for specific elements in the traffic rather than take a blanket approach.

Answered By TechSavvyDude92 On

Using custom rules can actually bypass managed rules, so it's often better to create exclusions within those managed rules instead. I started doing this by excluding specific argument names that were frequently flagged and it worked well for my situation. Just a heads up that if you have a custom rule applied, that request won't be checked against any managed rules, so that's something to consider.

Answered By PricingGuru99 On

If you're worried about costs, check out the Azure pricing calculator. It's worth noting that requests are typically charged as a single request, regardless of how many rules they're checked against.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.