Title here
Summary here
A Web Application Firewall (WAF) HTTP filter plugin for Envoy that leverages the Coraza WAF engine to provide layer 7 security for web applications.
For more information, see the Built on Envoy listing.
The WAF supports OWASP ModSecurity Core Rule Set configuration. Example enabling active blocking mode with CRS rules to detect and prevent SQL injection attacks:
filter_chains:
- filters:
- name: envoy.filters.network.http_connection_manager
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.network.http_connection_manager.v3.HttpConnectionManager
stat_prefix: ingress_http
http_filters:
- name: envoy.filters.http.golang
typed_config:
"@type": type.googleapis.com/envoy.extensions.filters.http.golang.v3alpha.Config
library_id: coraza-waf
library_path: /etc/envoy/coraza-waf.so
plugin_name: coraza-waf
plugin_config:
"@type": type.googleapis.com/xds.type.v3.TypedStruct
value:
directives: |
{
"waf1": {
"simple_directives": [
"SecRuleEngine On",
"Include @coraza.conf-recommended",
"Include @crs-setup.conf.example",
"Include @owasp_crs/*.conf"
]
}
}
default_directive: "waf1"The plugin can be deployed with custom rule configurations tailored to specific security requirements.