Skip to content

Commit 538e195

Browse files
committed
improve the CRS documentation
1 parent 511f92a commit 538e195

File tree

1 file changed

+20
-5
lines changed

1 file changed

+20
-5
lines changed

crowdsec-docs/docs/appsec/vpatch_crs.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,28 @@ sidebar_position: 5
66

77
## Overview
88

9-
This guide shows how to deploy both CrowdSec's virtual patching rules and OWASP Core Rule Set (CRS) together for comprehensive web application protection.
9+
This guide shows how to deploy both CrowdSec's virtual patching rules and [OWASP Core Rule Set (CRS)](https://coreruleset.org/) together for comprehensive web application protection. CrowdSec's Virtual Patching rules will always be configured as blocking rules, while OWASP CRS can be configured in blocking or non-blocking rules.
1010

11-
**Prerequisites**:
12-
- Basic AppSec setup completed (see [Getting Started guides](/appsec/quickstart/))
13-
- CrowdSec Security Engine installed and running
11+
### OWASP Core Rule Set
1412

15-
## Quick Setup
13+
The OWASP CRS is a set of generic attack detection rules that aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts. CRS provides protection against many common attack categories, including SQL Injection, Cross Site Scripting, Local File Inclusion, etc.
14+
15+
### CrowdSec Virtual Patching Rules
16+
17+
CrowdSec produces virtual patching rules for new (and sometime old) vulnerabilities that we see as having traction in the wild. While Virtual Patching rules doesn't offer a generic protection (as CRS might do) they do target specific vulnerabilities and offer nearly zero false positive chance.
18+
19+
## Objective
20+
21+
OWASP CRS can be integrated in various fashion with CrowdSec's WAF:
22+
- **Non Blocking** will not block requests that trigger CRS, however, repeating offenders will get banned.
23+
- **Blocking** will block any and all requests that trigger CRS, and ban repeating offenders.
24+
25+
:::info
26+
This documentation assumes that you already have a Basic WAF setup with CrowdSec Security Engine.
27+
:::
28+
29+
30+
## OWASP Core Rule Set - Non-Blocking
1631

1732
### Install Required Collections
1833

0 commit comments

Comments
 (0)