Web Application Firewalls (WAFs) are the most common protection for web applications. WAFs protect web applications by filtering and monitoring HTTP traffic between the application and the internet. However, WAFs need to be deployed and configured to protect web applications specifically. If they are not, this leaves open a potential route for an attacker.
Gaps in WAF protection are a substantial risk to organizations. According to research by Verizon, web application attacks are involved in 26% of all breaches, making them the second most common attack pattern. CyCognito’s semi-annual State of Exposure Management report reveals the average number of web applications in a large organization is a surprising 12,000. Given the severity of web attacks and the prevalence of web applications, CyCognito recently introduced a feature that discovers if web applications are protected by a WAF, and if so, which one. This post will explain how the feature works and how an organization can use it to prioritize and remediate exposed web applications.
The CyCognito platform can identify over 150 WAFs, including popular ones like Akamai, AWS CloudFront, Azure Front Door, Cloudflare, Fastly, Fortinet, and Imperva. Since CyCognito understands the entire attack surface of an organization, all web applications are probed for WAF protection. Figure 1 below shows all the web applications for Acme Corporation.
Figure 1: Web applications for Acme Corporation shown in CyCognito
CyCognito detects the presence of a WAF and the type of WAF by sending several HTTP requests to each web application. By analyzing the response from the web application, the CyCognito platform identifies patterns that match known WAFs, such as specific HTTP headers, cookies or HTML content.
If the above is not enough to identify that a WAF is present, or which WAF is present, a series of potentially malicious requests will be sent to the tested target, to attempt and identify the WAF using error messages and behavior of blocked requests. For example, Cloudflare is a great example of a WAF with a very indicative error message and is easily identifiable by its “Sorry, you have been blocked” message.
Users can see both the overall WAF coverage and individual application details in the CyCognito console. There are three main use cases:
Figure 2: Dashboard report shows that 4225 web applications are not protected by a WAF
Figure 3: Filtering to show assets protected by AWS Cloudfront.
The functionality is also available via the CyCognito API, allowing Integrations with SIEM, SOAR, ITSM, CMDB, and other types of IT and security products. A common action would be to open a ticket in Jira or ServiceNow and assign it to a security team member for investigation.
The feature is currently available to all CyCognito customers. Simply navigate to the Asset List section (shown above in Figure 3) and you’ll be able to filter out web applications according to which WAF was found to be protecting them. If you are not a CyCognito customer and are interested in a demo, please contact us.
Aviel is a former product manager at CyCognito and a cybersecurity expert with a background in enterprise security operations, penetration testing and working alongside Fortune 500 security teams.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.