Proactive Policy-Driven Monitoring: Exploring Operational and Technical WAF Considerations in Modern Banking


The Application Gateway provides web application security for multiple web applications with the protection of WAF integration. WAF policies assist with customizing security parameters for each individual application. When creating policies, system administrators should consider protection from malicious bots, crawlers, scanners, harmful SQL injection, Cross-site scripting, HTTP request smuggling, HTTP response splitting, remote file inclusion, and DDoS attacks (Microsoft Azure, n.d.). Through the creation of policies system administrators develop an incident response plan and create monitoring solutions that track malicious activity in logs that provide useful insight to fine tuning policies to provide increased security and proactive solutions to threats. Because WAF policies implement solutions for backend code that allow the IT team to participate in security solutions without modifying backend code directly, software engineers and IT teams should actively communicate to provide solutions to meet the bank’s evolving quality and compliance demands.


Reference

Microsoft Azure. (n.d.). What is Azure Web Application Firewall on Azure Application Gateway?. Microsoft. Retrieved from https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/ag-overview

Comments

Popular posts from this blog

SalonAboutBeauty: Less Integration for Consistent Styling Across Components

Why “Human Error” Is Usually a System Design Problem

Challenges in Prosecuting Deep Web and Darknet Crimes: The Case of Ross Ulbricht and the Silk Road