Skip to content

Commit f56ab06

Browse files
pedrosousaharshil1712
authored andcommitted
[WAF] Clarify OWASP ruleset vs OWASP Top 10 (#18234)
1 parent 434f2f1 commit f56ab06

File tree

1 file changed

+15
-2
lines changed
  • src/content/docs/waf/managed-rules/reference/owasp-core-ruleset

1 file changed

+15
-2
lines changed

src/content/docs/waf/managed-rules/reference/owasp-core-ruleset/index.mdx

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,28 @@ pcx_content_type: configuration
33
title: Cloudflare OWASP Core Ruleset
44
sidebar:
55
order: 3
6-
76
---
87

9-
import { DirectoryListing } from "~/components"
8+
import { DirectoryListing } from "~/components";
109

1110
The Cloudflare OWASP Core Ruleset is Cloudflare's implementation of the [OWASP ModSecurity Core Rule Set](https://owasp.org/www-project-modsecurity-core-rule-set/) (CRS). Cloudflare routinely monitors for updates from OWASP based on the latest version available from the official code repository.
1211

1312
The Cloudflare OWASP Core Ruleset is designed to work as a single entity to calculate a [threat score](/waf/managed-rules/reference/owasp-core-ruleset/concepts/#request-threat-score) and execute an action based on that score. When a rule in the ruleset matches a request, the threat score increases according to the rule score. If the final threat score is greater than the configured [score threshold](/waf/managed-rules/reference/owasp-core-ruleset/concepts/#score-threshold), Cloudflare executes the action configured in the last rule of the ruleset.
1413

14+
:::note
15+
16+
The Cloudflare OWASP Core Ruleset is Cloudflare's implementation of the OWASP ModSecurity Core Rule Set, which is different from the [OWASP Top 10](https://owasp.org/www-project-top-ten/).
17+
18+
The OWASP Top 10 is a list of the most severe security risks that can affect applications. Some of the identified security risks can be addressed by the OWASP Core Ruleset, but other risks cannot be protected by a web application firewall, such as the following:
19+
20+
- Insecure Design
21+
- Identification and Authentication Failures
22+
- Security Logging and Monitoring Failures
23+
24+
These risks depend more on how the application is built or how the entire monitoring pipeline is set up.
25+
26+
:::
27+
1528
## Resources
1629

1730
<DirectoryListing />

0 commit comments

Comments
 (0)