[Owasp-firewalls-project] Common WAF Protection Methods vs OWASP Top 10 2010

Adam Schroeder amschroeder at gmail.com
Mon Sep 17 19:31:35 UTC 2012


Greetings --

On the OWASP WAF Best Practices page:
https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls,
there is a table that outlines  the protection methods used by WAFS to
mitigate OWASP Top 10 vulnerabilities (see section "A5 Security versus
OWASP TOP10 - a comparison of WAFs and other methods").  Is anyone familiar
with an updated table (I believe that is using OWASP Top 10 2007
vulnerabilities)?

Thanks,
Adam
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-firewalls-project/attachments/20120917/fcef5aec/attachment.html>


More information about the Owasp-firewalls-project mailing list