While web application firewalls (WAFs) have long played — and continue to play — a key role in defending applications in production, they are far from perfect, especially against novel threats and zero-day exploits. Organizations can significantly improve their security posture at the application level by implementing Contrast Application Detection and Response (ADR).
A WAF is a network defense that filters, monitors and blocks HTTP traffic to and from a web application. Unlike a regular firewall that serves as a safety gate between servers, a WAF is able to watch application-level traffic and decide to allow or disallow based on the data that is visible over the network. WAF security typically performs Secure Socket Layer (SSL) termination to watch decrypted traffic for pattern-matching or volumetric attacks. Organizations often deploy WAFs to detect and block known threats, but WAFs alone cannot protect modern applications from exploitation.
WAFs may come in the form of an appliance, a server plugin, a filter or a WAF operated by a cloud or service provider. WAFs can be customized to an application, but the effort to perform this customization can be significant and needs to be maintained as the application is modified. The ideal solution is one that provides continuous visibility, application intelligence and very rapid response.
By adding a WAF, an organization can proactively address threats, hackers, bots and vulnerabilities that can lead to expensive attacks. WAFs act as a shield at the perimeter, inspecting incoming traffic for malicious payloads associated with known attack patterns.
They offer several advantages:
Many legal guidelines and industry frameworks, like NIST CSF 2.0, don’t specifically require WAFs or other specific technologies. However, it is worthwhile to note that when the latest version of Payment Card Industry Data Security Standards (PCI DSS) framework goes into effect in March 2025, WAFs will be required, along with authenticated vulnerability scans and other technologies and frameworks.
Rule-based WAFs must be configured and maintained in order to achieve sufficient protection. Organizations must also adjust the configurations and rules as their organization grows and/or changes.
Other key limitations to note with WAFs:
A WAF can watch data that goes over the network, but its architecture does not enable it to see how that data is actually used. As a result, a WAF sounds an equal alarm for all attack attempts without raising the importance for attacks that could actually work. This is inefficient, as it can require SOC teams to investigate issues that may not be relevant and can result in constant manual tuning or auto-tuning. Success depends on information that WAFs simply do not have.
WAFs primarily analyze the content of incoming requests. They might spot an unusually structured data payload, but they often lack the context to understand how an application will process that data during deserialization. This means attacks that exploit application logic flaws in the deserialization process can slip through a WAF’s defenses.
There’s a similar dynamic at play with zero-day attacks. Until specific signatures are released, WAFs have little chance of stopping zero-day exploits like Log4Shell attacks.
By combining WAF and ADR, organizations can achieve a more comprehensive and future-proof Application Security (AppSec) posture, significantly reducing the risk of successful cyberattacks.
This layered approach offers several benefits:
ADR technology in particular is especially beneficial for protecting applications in production because it works within the application itself. This approach offers several key advantages:
By implementing ADR, organizations can fill this critical gap in their security posture that WAFs don’t cover, gaining the ability to detect and respond to sophisticated application-level threats that existing solutions might miss. Contrast Security employs innovative ADR technology to detect and prevent attacks like zero-day exploits at multiple stages.
WAF bypasses are techniques attackers use to render WAF security controls ineffective. These include methods to sneak malicious payloads past the WAF's signature-based protections, or outright avoidance of the WAF entry point to the application.
To get a sense of how Contrast ADR supplements WAFs, consider an attack against the infamous Log4Shell vulnerability (CVE-2021-44228), which affects the common Java logging framework Log4j. As the following overview shows, attacks against the Log4Shell vulnerability can be obfuscated, making them hard to detect through simple pattern matching of network-level protections.
When Contrast ADR is in place, attacks targeting the same vulnerability that a WAF may miss are more effectively addressed. For example, here’s a high-level overview of how Contrast ADR addresses an attack targeting the Log4Shell vulnerability:
For an additional example of attacks that WAFs miss but Contrast ADR addresses, check out our white paper on The Case for Application Detection and Response (ADR). In it, Jeff Williams, Founder and CTO of Contrast Security, highlights how ADR addresses unsafe deserialization attacks that WAFs too frequently miss.
By understanding the anatomy of modern attacks and leveraging cutting-edge ADR solutions, organizations can significantly enhance their security posture, minimize risk and stay ahead of emerging threats. As a security decision-maker, investing in ADR technology is not just a security measure — it's a strategic imperative for safeguarding your organization's digital assets in today's threat landscape.