Deploy WAAS
WAAS (Web-Application and API Security) can secure both containerized and non-containerized web applications.
To deploy WAAS, create a new rule, and declare the entity to protect.
Although the deployment method varies slightly depending on the type of entity you’re protecting, the steps, in general, are:
- Define rule resource.
- Define application scope.
- Enable relevant protections.
Understanding WAAS rule resources and application scope
The WAAS rule engine is designed to let you tailor the best-suited protection for each part of your deployment. Each rule has two scopes:
- Rule resources.
- Application list.
Rule Resources
This scope defines, for each type of deployment, a combination of one or more elements to which WAAS should attach itself to protect the web application:
- - Containers, images, namespaces, cloud account IDs, hosts.
- - Host on which the application is running.
- - Function name.
In the event of scope overlap (when multiple rules are applied to the same resource scope), the first rule by order will apply and all others will not apply. You can reorder rules via the Order column in WAAS rule tables by dragging and dropping rules.
Application List
This scope defines the protected application’s endpoints within the deployment as a combination of one or more of the following:
- - For containerized applications, the internal port on which the application is listening. For all other types, the externally facing port.
- - The default setting is set to * (wildcard indicating all hostnames)
- - Lets you apply protection policy on certain paths of the application (e.g. "/admin", "/admin/*", etc.)
- - TLS certificate to be used when expecting encrypted inbound traffic.
To better illustrate, consider the following deployment scenario for a web application running on top of an NGINX cluster:

In this example, different policies apply for different parts of the application.
The steps for deploying a WAAS rule to protect the above-described web application would be as follows:
- Define rule resources- Specify the resource collection the rule applies to. Collections are comprised of image names and one or more elements to which WAAS should attach itself to protect the web application. In the following example, the rule will apply to all containers created by the Nginx image.
- Define protection policy for 'login', 'search', and 'product' endpoints- Set OWASP Top 10 protection to "Prevent" and geo-based access control to "Alert".
- Define protection policy for the application’s API endpoints- Set OWASP Top 10 and API protection to "Prevent" and HTTP header-based access control to "Alert".
Once the policy is defined, the rule overview shows the following rule resource and application definitions:

- - Protection is applied to all NGINX images
- - We deployed two policies each covering a different endpoint in the application (defined by HTTP hostname, port, and path combinations).
Protection evaluation flow
WAAS offers a range of protection targeted at different attack vectors.
Requests inspected by WAAS will be inspected in the following order of protection:
- Bot protection
- App firewall (OWASP Top-10)
- API protection
- DoS protection
WAAS Inline proxy will continue to inspect a request until "Prevent" or "Ban" actions are triggered, at which point the request will be blocked, and the evaluation flow will be halted. In the case of WAAS Out-of-band, the requests will be inspected and alerts will be sent to the Console.
For example, in the WAAS Inline proxy setup, assume all protections in bot protection are set to "Prevent". An incoming request originating from a bot and containing a SQL injection payload would be blocked by the bot protection (since it precedes the app firewall in the evaluation flow), and the SQL injection payload will not be assessed by the app firewall.
In a different scenario, suppose that all bot protections are set to "Alert" and all app firewall protections are set to "Prevent". A request originating from a bot containing a command injection payload will generate an alert event by bot protection and will be blocked by the app firewall protection.
Recommended WAAS Deployment Phases
It is recommended that WAAS is first deployed in non-production environments, and then promoted and implemented in production environments gradually.
Below are the guidelines for each of the recommended phases and their prerequisites.
Prerequisites:
- A way to test the application before deploying WAAS and verify that it’s working properly, e.g., a working cURL command with the expected outcome.
- A certificate (public certificate and private key files in PEM format) is required if the application employs TLS.
- If you are planning to protect API endpoints, please provide API specification files if available (Swagger or OpenAPI 3)
- Deploy WAAS in a test environment (preferably one that is as similar to production as possible).All protections will be set to "Alert".
- Allow WAAS to inspect traffic to the test environment for a few days, then regroup to examine triggers and findings. It is recommended to generate traffic to the test environment preferably requests that simulate real user messages.The goal here is to fine-tune protections so that they correspond with the design of the protected application.This would also be a good way to assess the performance impact introduced by WAAS and compare it to the performance of the application before the deployment of WAAS.
- Following the successful completion of phases 1 and 2, deploy WAAS on a small portion of production with the same configuration that you tested in the test environment.Next, examine the findings after a few days and make any necessary adjustments to the policies.
- Deploy WAAS across the entire production deployment of the application.