{"id":7771,"date":"2020-06-20T10:15:54","date_gmt":"2020-06-20T09:15:54","guid":{"rendered":"https:\/\/staging-site.42crunch.com\/?p=7771"},"modified":"2022-09-24T14:25:28","modified_gmt":"2022-09-24T13:25:28","slug":"adopting-a-positive-security-model","status":"publish","type":"post","link":"https:\/\/staging2022.42crunch.com\/adopting-a-positive-security-model\/","title":{"rendered":"42Crunch approach vs. Traditional WAF approach: using positive security by default"},"content":{"rendered":"

When talking to prospects or presenting our solution at conferences, we inevitably get asked the same question: what’s the difference between your solution and a Web Application Firewall (WAF)?<\/p>\n

The core difference is that we know what we are protecting, WAFs don’t.<\/strong><\/p><\/blockquote>\n

WAFs were built to protect web applications and there is no standard way to describe what a web application does and how to interact with it (its “interface”, if you prefer). Faced with that challenge, WAFs, by default, use a negative security model (a denylist). Such an approach leverages a library of threats \u2014 often in the format of massive regular expressions \u2014 describing the patterns of data to look for in the traffic.<\/p>\n

A negative model comes with a major limitation: false positives management. False positives can have a major business impact, when they block critical transactions. To avoid false positives, WAF administrators must create complex and specific rules, and in doing so, need to find a sweet equilibrium between protecting the APIs and letting legitimate traffic through. This often leads to deploying very generic rules that only catch the most obvious threats. Moreover, most WAFs do not natively understand API traffic. This is particularly true when it comes to validating input that is based on schemas, like in XML or JSON payloads.<\/p>\n

While using an allowlist (vs. a denylist) is indeed technically possible in WAFs, it is a full-time job: positive rules must always be aligned with development, and security teams in large enterprises often have several people on payroll doing this.<\/p>\n

Positive security and APIs<\/h2>\n

Many of the issues on the OWASP API Security Top 10<\/a> are triggered by the lack of input or output validation. Here are a few illustrative real-life examples on this:<\/p>\n