Slide 3
Slide 3 text
© Okta and/or its affiliates. All rights reserved. Highly sensitive information; do not distribute. DATA CLASSIFICATION: OKTA RESTRICTED
Why using a WAF?
● Request/response inspection to avoid zero-day attacks, client-side attacks, bot attacks,
etc.
● Security rules: SQL Injection, XSS Attacks, Local/Remote File Inclusion, Size Restrictions,
etc.
● Anomaly scoring: assigns score to malformed/suspicious traffic and blocks based on
thresholds.
● Virtual patching: security patches at HTTP traffic level to skip CVEs
● Audit logs for security analysis.