You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/security/application_security/_index.md
+23Lines changed: 23 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -79,6 +79,25 @@ To start configuring your environment to detect and protect threats with AAP, fo
79
79
80
80
In the [Security Signals Explorer][6], click on any security signal to see what happened and the suggested steps to mitigate the attack. In the same panel, view traces with their correlated attack flow and request information to gain further context.
81
81
82
+
## Exploit Prevention vs. In-App WAF
83
+
84
+
This section provides a summary of Exploit Prevention and how it differs from In-App Web Application Firewall (WAF) rules.
85
+
86
+
Datadog AAP includes the [Exploit Prevention][14] and [In-App WAF][15] features to protect your applications against exploits. Exploit Prevention is an extension of In-App WAF. Exploit Prevention leverages In-App WAF as the first line of defense and then blocks attacks missed by the WAF.
87
+
88
+
Exploit Prevention leverages Runtime Application Self-Protection (RASP) technology to determine if an application request interacts with a vulnerable code path, and then protects it from specific vulnerability types:
89
+
90
+
- SQL injection (SQLi)
91
+
- Server-Side Request Forgery (SSRF)
92
+
- Local File Inclusion (LFI)
93
+
- Command Injection
94
+
95
+
For library compatibility, see [Exploit Prevention][13].
96
+
97
+
In addition to detecting malicious patterns in the request, Exploit Prevention differs from In-App WAF by tracking the actions performed by the application (SQL query executed, files accessed, and so on). Exploit Prevention is able to determine if user input modified the SQL query or restricted a file detrimentally, and block it.
98
+
99
+
For example, in a SQL injection attack, the goal of the attacker is to take control of the SQL query and change its meaning. Exploit Prevention parses the SQL query before execution and checks for any user parameter in the query. If one is present, Exploit Prevention checks if the SQL parser interpreted the parameter as multiple SQL tokens (changing the meaning of the SQL query). In that case, Exploit Prevention flags the query as injected.
100
+
82
101
## Disable AAP
83
102
84
103
For information on disabling AAP or its features, see the following:
@@ -100,3 +119,7 @@ For information on disabling AAP or its features, see the following:
Copy file name to clipboardExpand all lines: content/en/security/application_security/exploit-prevention.md
+3Lines changed: 3 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,8 @@ Combine telemetry from the Datadog tracer with predefined heuristics to detect a
29
29
30
30
This is powered by Runtime Application Self Protection (RASP), which allows you to detect and prevent attacks in real time.
31
31
32
+
For details on how Exploit Prevention differs from In-App WAF, see [Exploit Prevention vs. In-App WAF][12].
33
+
32
34
## How exploit prevention works
33
35
34
36
1. With the Datadog AAP tracing library instrumented in your applications, details are captured about every interaction within the application, including requests, code execution, and data flows.
@@ -119,3 +121,4 @@ In addition, AAP also generates a signal correlating all the blocked traces and
Copy file name to clipboardExpand all lines: content/en/security/application_security/waf-integration.md
+5-2Lines changed: 5 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,9 @@ further_reading:
9
9
text: "Monitor AWS WAF activity with Datadog"
10
10
---
11
11
12
-
Protecting web applications and APIs requires a multi-layered approach that combines in-app monitoring and perimeter defenses. These complementary strategies enable you to have a defense-in-depth App and API Protection approach leveraging AWS Web Application Firewall (WAF) as the first line of defense, followed by App and API Protection to block attacks that slip by the WAF.
12
+
Protecting web applications and APIs requires a multi-layered approach that combines in-app monitoring and perimeter defenses. These complementary strategies enable you to have a *defense-in-depth* App and API Protection approach that leverages AWS Web Application Firewall (WAF) as the first line of defense, followed by Exploit Prevention for blocking attacks that slip by the WAF.
13
+
14
+
For details on how Exploit Prevention differs from In-App WAF, see [Exploit Prevention vs. In-App WAF][5].
13
15
14
16
### In-app monitoring: deep visibility with distributed tracing
15
17
@@ -61,4 +63,5 @@ There are two main use cases supported with this [integration][1]:
0 commit comments