Forum Discussion
ASM
The ASM has a lot of ability and various ways to perform protection. I also would recommend reading the series written by John Wagon. It was a 10 part series and goes through some of the various levels of protection. Also you may want to for some white papers and read through them as well.
Just at a high level here are some of the things you can do with ASM.
- Restrict access to only certian file types, URLs and parameters (as well as checking the input for those parameters)
- Utilize Attack Signatures to check for known malicious traffic
- Check for malformed traffic by using HTTP Compliance
- Look Evasion Techniques
- Provide DoS protection
- Look for Web Scraping, XSS, and clickjacking
- GeoLocation restriction and IP Reputation (the later requires extra licensing)
Really if you build a solid white listing policy and re enforce that with the negative security checking of Attack Sigantures, Anomaly Detection, and IP restriction you can limit your exposure to most attacks.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com