Skip to content

Commit a14c1ed

Browse files
added Exploit Prevention vs. In-App WAF section (#29996)
Co-authored-by: Bryce Eadie <[email protected]>
1 parent 6a59b99 commit a14c1ed

File tree

3 files changed

+31
-2
lines changed

3 files changed

+31
-2
lines changed

content/en/security/application_security/_index.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,25 @@ To start configuring your environment to detect and protect threats with AAP, fo
7979

8080
In the [Security Signals Explorer][6], click on any security signal to see what happened and the suggested steps to mitigate the attack. In the same panel, view traces with their correlated attack flow and request information to gain further context.
8181

82+
## Exploit Prevention vs. In-App WAF
83+
84+
This section provides a summary of Exploit Prevention and how it differs from In-App Web Application Firewall (WAF) rules.
85+
86+
Datadog AAP includes the [Exploit Prevention][14] and [In-App WAF][15] features to protect your applications against exploits. Exploit Prevention is an extension of In-App WAF. Exploit Prevention leverages In-App WAF as the first line of defense and then blocks attacks missed by the WAF.
87+
88+
Exploit Prevention leverages Runtime Application Self-Protection (RASP) technology to determine if an application request interacts with a vulnerable code path, and then protects it from specific vulnerability types:
89+
90+
- SQL injection (SQLi)
91+
- Server-Side Request Forgery (SSRF)
92+
- Local File Inclusion (LFI)
93+
- Command Injection
94+
95+
For library compatibility, see [Exploit Prevention][13].
96+
97+
In addition to detecting malicious patterns in the request, Exploit Prevention differs from In-App WAF by tracking the actions performed by the application (SQL query executed, files accessed, and so on). Exploit Prevention is able to determine if user input modified the SQL query or restricted a file detrimentally, and block it.
98+
99+
For example, in a SQL injection attack, the goal of the attacker is to take control of the SQL query and change its meaning. Exploit Prevention parses the SQL query before execution and checks for any user parameter in the query. If one is present, Exploit Prevention checks if the SQL parser interpreted the parameter as multiple SQL tokens (changing the meaning of the SQL query). In that case, Exploit Prevention flags the query as injected.
100+
82101
## Disable AAP
83102

84103
For information on disabling AAP or its features, see the following:
@@ -100,3 +119,7 @@ For information on disabling AAP or its features, see the following:
100119
[10]: /security/application_security/troubleshooting/#disabling-aap
101120
[11]: /security/application_security/troubleshooting/#disabling-software-composition-analysis
102121
[12]: /security/application_security/troubleshooting/#disabling-code-security
122+
[13]: /security/application_security/exploit-prevention/#library-compatibility
123+
[14]: /security/application_security/exploit-prevention/
124+
[15]: /security/application_security/waf-integration/
125+

content/en/security/application_security/exploit-prevention.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Combine telemetry from the Datadog tracer with predefined heuristics to detect a
2929

3030
This is powered by Runtime Application Self Protection (RASP), which allows you to detect and prevent attacks in real time.
3131

32+
For details on how Exploit Prevention differs from In-App WAF, see [Exploit Prevention vs. In-App WAF][12].
33+
3234
## How exploit prevention works
3335

3436
1. With the Datadog AAP tracing library instrumented in your applications, details are captured about every interaction within the application, including requests, code execution, and data flows.
@@ -119,3 +121,4 @@ In addition, AAP also generates a signal correlating all the blocked traces and
119121
[9]: https://github.com/DataDog/dd-trace-js
120122
[10]: https://github.com/DataDog/dd-trace-php
121123
[11]: https://github.com/DataDog/dd-trace-rb
124+
[12]: /security/application_security/#exploit-prevention-vs-in-app-waf

content/en/security/application_security/waf-integration.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ further_reading:
99
text: "Monitor AWS WAF activity with Datadog"
1010
---
1111

12-
Protecting web applications and APIs requires a multi-layered approach that combines in-app monitoring and perimeter defenses. These complementary strategies enable you to have a defense-in-depth App and API Protection approach leveraging AWS Web Application Firewall (WAF) as the first line of defense, followed by App and API Protection to block attacks that slip by the WAF.
12+
Protecting web applications and APIs requires a multi-layered approach that combines in-app monitoring and perimeter defenses. These complementary strategies enable you to have a *defense-in-depth* App and API Protection approach that leverages AWS Web Application Firewall (WAF) as the first line of defense, followed by Exploit Prevention for blocking attacks that slip by the WAF.
13+
14+
For details on how Exploit Prevention differs from In-App WAF, see [Exploit Prevention vs. In-App WAF][5].
1315

1416
### In-app monitoring: deep visibility with distributed tracing
1517

@@ -61,4 +63,5 @@ There are two main use cases supported with this [integration][1]:
6163
[1]: https://app.datadoghq.com/security/appsec/protection?use-case=amazon_waf
6264
[2]: /integrations/amazon_waf/#log-collection
6365
[3]: https://app.datadoghq.com/[email protected]:%22Application%20Security%22&product=appsec
64-
[4]: https://app.datadoghq.com/security/appsec/traces
66+
[4]: https://app.datadoghq.com/security/appsec/traces
67+
[5]: /security/application_security/#exploit-prevention-vs-in-app-waf

0 commit comments

Comments
 (0)