WASC OWASP Web Application Firewall Evaluation Criteria Project

=Main= 

Background
Web application firewalls (WAF) are an evolving information security technology designed to protect web sites from attack. WAF solutions are capable of preventing attacks that network firewalls and intrusion detection systems can't, and they do not require modification of application source code.

As today's web application attacks expand and their relative level of sophistication increases, it is vitally important to develop a standardized criteria for WAFs evaluation. The Web Application Firewall Evaluation Criteria Project (WAFEC) serves two goals:
 * Help stakeholders understand what a WAF is and its role in protecting web sites.
 * Provide a tool for users to make an educated decision when selecting a WAF.

Project Structure
WAFEC is a joined project between The Web Application Security Consortium (WASC) and OWASP making sure the best minds in the industry, both those who work day and night to develop WAFs and those who implement and use them, are committed to ensure WAFEC is comprehensive, accurate and objective.

History
The first version of WAFEC was released in 2006 and is in wide use in the industry. In 2013, the project team was gearing up to release version 2. Due to a number of issues with WAFEC as outlined in the 2013 OWASP AppSecEU presentation WASC/OWASP WAFEC this project was sidelined until earlier this year when it transitioned from Ofer Shezaf to Tony Turner. We are now working on rebooting the WAFEC project and plan to release it in the second half of 2016. If you want to be a part of the project check out the page or join the the mailing list and chime in when you feel ready.

More information
If you have any other question or idea, please contact WAFEC project leader [mailto:tony.turner@owasp.org Tony Turner].

Presentations

 * WAFEC: From Industry to Community Project - AppsecEU 2013 (Shezaf and Hoffmann) Video
 * WAFEC, or How to Choose WAF Technology (RAFAEL SAN MIGUEL CARRASCO)
 * WAFs When Are They Useful (Ivan Ristic)

News and Events

 * September 2015 AppSecUSA Workshop
 * June 2015 Project Reboot

Mailing List

 * WAFEC Mailing list (WASC)

=FAQ=

1. Is WAFEC unfairly biased in favor of vendors who participate?

ANSWER: All contributions sourced by the vendor sub-group or provided by the active employee for any WAF vendor are peer-reviewed by all other participating vendors before the update can be committed. Vendors who want to have input in the direction of the WAFEC standard should see the Volunteering link and get involved.

2. Is WAFEC a dead project?

ANSWER: Most certainly not! WAFEC has been rebooted as of June 2015 under the leadership of Tony Turner and a project workshop is being held at the AppSecUSA conference in San Francisco to renew efforts at the next version. See the Roadmap for more information

3. Does WAFEC certify WAF vendors?

ANSWER: WAFEC does not currently provide certification but instead intends to provide tools for others to perform their own independent evaluation for WAF vendors. It is important that any evaluation take into consideration the unique requirements and documented use cases for the WAF as not all deployments will have the same requirements.

4. Does WAFEC recommend $vendorX?

ANSWER: WAFEC remains impartial and does not recommend or discourage any vendor over another. There are often scenarios where a less capable product may be a smarter choice than a best of breed solution, or a niche product may be very well-suited for a particular use case. The WAFEC team works with multiple vendors and does not show bias in any way. Any vendor is welcome to participate in standards development and contributions will be made public consistent with OWASP transparency expectations.

5. Is WAFEC releasing 2.0 or 3.0 next?

ANSWER: WAFEC will be releasing a slightly revised version of the 2012 v2.0 efforts sometime in early 2016. Most revisions articulated by the new (2015) project team will be reserved for the 3.0 release planned for late 2016

=Roadmap=

Summer 2015

 * Re-establish project team - Initial team and structure created - Still LFV
 * Migrate existing v2.0 doc to Google Docs - Completed
 * Address outstanding comments - Comment integration completed into gDoc, but updates not yet incorporated into document

Fall 2015

 * Conduct workshop at AppSecUSA 2015
 * Decide on versioning - Plan to release mostly unchanged 2.0 and then move most revisions into future 3.0 document
 * Reformat document for 3.0

Winter 2015

 * Logo and design work
 * Marketing strategy

2.0


 * Complete 1st draft
 * Plan for 2.0 release
 * Internal Testing

3.0


 * Create new document outline
 * Begin document re-work
 * Create framework for evaluating controls

Spring 2016

 * Release 2.0

3.0


 * Complete 1st draft
 * Internal Testing
 * Conference presentation

Summer 2016

 * Pre-release/Beta
 * Socialize the project and upcoming release

Fall 2016

 * Release WAFEC v3.0
 * Post-release support

Winter 2016

 * Revisit associated tools like Response Matrix

=Project Team= Core Team


 * Tony Turner (Leader) – GuidePoint Security
 * VACANT (Co-Leader)

Contributors


 * Renaud Bidou – TrendMicro (formerly Radware and DenyAll)
 * Achim Hoffmann (former WAFEC contributor)
 * Santiago Ingold
 * Jean Dogo

Vendor Sub-group - Newly formed as of 2015 reboot effort


 * Peter Vogt – Sentrix
 * Erwin Huber – Ergon
 * Mark Kraynak – Imperva
 * Raphael Chileshe – Radware
 * Ido Breger – F5
 * Tin Zaw - Verizon
 * John Mcllwain - Cdnetworks
 * Ryan Barnett - Akamai
 * Ory Segal - Akamai
 * Vincent Maury - DenyAll

v2.0 Contributors - 2012 effort


 * Achim Hoffmann, sic[!]sec
 * Amichai Shulman, Imperva
 * Erwin Huber, Airlock (Ergon)
 * Mark Kraynak, Imperva
 * Ofer Shezaf, Project Lead
 * Ryan Barnett, Trustwave
 * Tal Beery, Imperva

v2.0 Reviewers - 2012 effort
 * Anshuman Singh, Barracuda Networks
 * Achim Hoffmann, sic[!]sec
 * Christian Heinrich, Individual Contributor
 * David DeSanto, NSS Labs
 * Ido Breger, F5
 * Jason Leung, Mykonos, a Juniper Company
 * Klaubert Herr da Silveira
 * Julian Totzek, Deny All
 * Matthieu Estrade, Beeware
 * Or Katz, Individual Contributor
 * Ory Segal, Akamai
 * Paul Scott, Individual Contributor
 * Przemyslaw Skowron, Alior Bank
 * Rip, OWASP China
 * Robert Auger, Individual Contributor
 * Victor Pinenkov, Mykonos, a Juniper Company

v1.0 Contributors


 * Robert Auger (SPI Dynamics)
 * Ryan C. Barnett (EDS)
 * Charlie Cano (F5)
 * Anton Chuvakin (netForensics)
 * Matthieu Estrade (Bee Ware)
 * Sagar Golla (Secureprise)
 * Jeremiah Grossman (WhiteHat Security)
 * Achim Hoffmann (Individual)
 * Amit Klein (Individual)
 * Mark Kraynak (Imperva)
 * Vidyaranya Maddi (Cisco Systems)
 * Ofer Maor (Hacktics)
 * Cyrill Osterwalder (Seclutions AG)
 * Sylvain Maret (e-Xpert Solutions)
 * Gunnar Peterson (Arctec Group)
 * Pradeep Pillai (Cisco Systems)
 * Kurt R. Roemer (NetContinuum)
 * Kenneth Salchow (F5)
 * Rafael San Miguel (daVinci Consulting)
 * Greg Smith (Citrix Systems)
 * David Movshovitz (F5)
 * Ivan Ristic (Thinking Stone) [Project Leader]
 * Ory Segal (Watchfire)
 * Ofer Shezaf (Breach Security)
 * Andrew Stern (F5)
 * Bob Walder (NSS Group)

If you are a prior contributor and want to participate in renewed efforts at WAFEC 2.0 and beyond please contact [mailto:tony.turner@owasp.org Tony Turner].

=Volunteering=

Current Needs include

 * Web App Pentesters experienced with WAF Bypasses
 * WAF Implementers
 * WAF Developers
 * WAF Vendor Liaisons
 * Metrics and standardization professional
 * Copy edit ninjas
 * Graphics designer

If you are interested, please contact WAFEC project leader [mailto:tony.turner@owasp.org Tony Turner].

=Project About=