Web Application Firewall Summary

Web Application Firewall (WAF) is a security solution that protects web applications from various online threats and attacks. It sits between the user and the web server, analysing incoming traffic to filter out malicious requests and protect the application from potential vulnerabilities. The WAF helps safeguard against common web-based attacks like SQL injection, cross-site scripting (XSS), and other application-layer exploits.

A Web Application Firewall employs a set of specific firewall rules to block complex attacks. These rules are based on known attack patterns and anomalies and are designed to detect and prevent attacks. Some examples of specific firewall rules that can block complex attacks include:

  • Signature-based Rules: These rules identify known attack patterns and malicious payloads, such as specific SQL injection strings or XSS scripts, and block traffic that matches these patterns.
  • Behavioral Rules: These rules analyse traffic behaviour and block requests that exhibit suspicious or abnormal patterns, even if they don't match a specific attack signature.
  • Rate Limiting Rules: These rules restrict the number of requests from a single IP address within a given time frame, mitigating the impact of brute-force and DDoS attacks.
  • Session Management Rules: These rules monitor and enforce session-related behaviours to prevent session hijacking and token manipulation attacks.
  • Geolocation Rules: These rules block or allow traffic based on the IP address's geographic location, helping filter out traffic from known malicious regions.

My WordPress WAF has all of these types of rules enabled.

The WAF Summary below displays the count of attacks the Web application firewall prevents on my WordPress website. The summary comprises three categories of attacks: Complex Attacks, Brute Force Attacks, and Blacklist Blocks.

  • Complex Attacks occur when a visitor requests the website with malicious intent to exploit the website or find a vulnerability that can be exploited later. The firewall rules block these types of attacks.
  • Brute Force Attacks are attempts to guess usernames and passwords to gain access to the WordPress admin.
  • Blacklist Blocks indicate the number of times an IP has been blocked from accessing the site as a preventive measure.

Determining which IP addresses to blacklist usually involves analysing various factors to identify potentially malicious sources. Some common methods include:

  • Intrusion Detection/Prevention Systems (IDS/IPS): These systems monitor network traffic and identify suspicious or malicious behaviour. If an IP address is involved in malicious activities, it can be added to the blacklist.
  • Threat Intelligence Feeds: WAFs may use threat intelligence feeds from reputable sources that maintain lists of IP addresses associated with cyber threats. IP addresses from these feeds can be automatically added to the blacklist.

  • Anomaly Detection: The firewall may identify IP addresses that deviate significantly from typical traffic patterns or show patterns consistent with malicious activities, leading to blacklisting.

  • User Reports and Reputation Services: WAFs can consider user reports and reputation services that track and rate IP addresses' trustworthiness. Repeatedly flagged IP addresses may end up on the blacklist.

  • Manually Curated Lists: Security administrators can manually add suspicious IP addresses to the blacklist based on their analysis or incident reports.

My Web Application Firewall (WAF) utilises a combination of methods to dynamically update its blacklist, effectively blocking traffic from potentially harmful IP addresses. This proactive approach helps safeguard my WordPress website from malicious activities and ensures enhanced security.

Block Type Complex Brute Force Blacklist Total
Today 0 0 166 166
Week 63 193 963 1219
Month 112 193 4323 4628

Addressing the Cybersecurity Skills Gap

Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap? (Security Intelligence)

...the skill sets required tend to be more diverse than other IT-related jobs. In addition to tech skills, cybersecurity jobs also require skills that align with liberal arts and humanities fields, such as communications and psychology. This has the potential to open the door to a wide range of candidates.

What’s missing is an accurate job description, said Wesley Simpson, chief operating officer with (ISC)2, during a conversation at the company’s Security Congress in October. Hiring managers who write up job descriptions often don’t have a complete understanding of the actual skill needs for these cybersecurity careers. There is a tendency to become enamored with certifications, which a person often can’t qualify for until they have years of job experience.

However, many of these jobs that “require” certifications are essentially entry-level jobs, so the people who should be applying for them don’t because they don’t carry certifications. On the other hand, people who do apply may be over-qualified and see the position as a lateral move, which could lead them to turn an offer down.

Is an inability to define security the main cause of the cybersecurity skills gap? If we can't truly define what security is, how can organizations design the right cybersecurity jobs for their needs?

Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap? (Security Intelligence)

...the skill sets required tend to be more diverse than other IT-related jobs. In addition to tech skills, cybersecurity jobs also require skills that align with liberal arts and humanities fields, such as communications and psychology. This has the potential to open the door to a wide range of candidates.

What’s missing is an accurate job description, said Wesley Simpson, chief operating officer with (ISC)2, during a conversation at the company’s Security Congress in October. Hiring managers who write up job descriptions often don’t have a complete understanding of the actual skill needs for these cybersecurity careers. There is a tendency to become enamored with certifications, which a person often can’t qualify for until they have years of job experience.

However, many of these jobs that “require” certifications are essentially entry-level jobs, so the people who should be applying for them don’t because they don’t carry certifications. On the other hand, people who do apply may be over-qualified and see the position as a lateral move, which could lead them to turn an offer down.

As part of the interview team, I am sometimes interviewing individuals with less experience but who appear to be enthusiastic about the field. Some are often on my shortlist for recommended hiring. However, many times, the rest of the interview team and the hiring manager want someone with more experience. Everyone wants a unicorn.

How do we fix this?