Kernel of Truth

A cheat-sheet table mapping OWASP Top 10 to WAF protections

Mapping OWASP Top 10 Risks to WAF Capabilities

OWASP Top 10 RiskWhat the Attack IsCan a WAF Mitigate It?How a WAF HelpsLimitations
A01: Broken Access ControlUsers access data or functions they should not❌ LimitedBlocks obvious parameter tampering and forced browsing patternsCannot understand business logic or authorisation flaws
A02: Cryptographic FailuresWeak encryption or sensitive data exposure❌ NoMay enforce TLS and block insecure protocolsEncryption must be fixed in the application or infrastructure
A03: Injection (SQL, OS, LDAP, XPath)Malicious input executed by backend systems✅ YesDetects SQL keywords, shell metacharacters, injection patternsCan be bypassed with obfuscation if not tuned
A04: Insecure DesignArchitectural flaws in application design❌ NoNoneRequires secure SDLC and threat modelling
A05: Security MisconfigurationDefault settings, debug pages, open directories✅ PartialBlocks access to admin paths and sensitive filesMisconfiguration must still be fixed at source
A06: Vulnerable and Outdated ComponentsKnown vulnerable libraries and frameworks❌ LimitedVirtual patching for known exploit signaturesCannot patch the underlying vulnerability
A07: Identification and Authentication FailuresWeak login, session handling issues✅ PartialRate limits brute force, blocks credential stuffingDoes not fix weak authentication logic
A08: Software and Data Integrity FailuresSupply chain attacks, unsafe deserialisation❌ NoNoneRequires code signing and integrity controls
A09: Security Logging and Monitoring FailuresLack of detection and alerting✅ IndirectProvides telemetry and logs to SIEMDoes not replace SOC monitoring
A10: Server-Side Request Forgery (SSRF)Server makes malicious internal requests✅ PartialDetects suspicious outbound request patterns in some WAFsHard to detect without deep application context

Key Takeaways for Cyber Security Engineers

What WAFs Are Very Good At

WAFs are highly effective against:

  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Command Injection
  • Directory Traversal
  • Remote File Inclusion
  • Automated bots and credential stuffing
  • Layer 7 DDoS

These align strongly with OWASP A03 Injection and A07 Authentication Failures.


What WAFs Are Weak At

WAFs provide little or no protection for:

  • Broken Access Control
  • Insecure Design
  • Cryptographic Failures
  • Software Supply Chain Risks
  • Business Logic Abuse

These require:

  • Secure coding
  • Architecture reviews
  • DevSecOps pipelines
  • Identity and access controls

Real Interview Talking Point (High Value)

“A WAF mitigates exploit techniques, not design flaws. It is a compensating control, not a substitute for secure development.”

This sentence scores very highly in senior security engineer interviews.


Practical SOC / Detection Engineering Notes

Security engineers often use WAF logs to detect:

  • OWASP Top 10 scanning activity (Burp, sqlmap, Nikto)
  • Automated exploitation attempts
  • Botnet credential stuffing campaigns
  • Reconnaissance of admin endpoints

Typical detection rules include:

  • High rate of 403 or 406 responses
  • Repeated injection signatures
  • Requests to /wp-admin, /phpmyadmin, /cgi-bin
  • Excessive login failures

🛡️Latest Security Alerts 🛡️

NCSC Latest
(The National Cyber Security Centre UK)