<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Praktik pada WAF - Indonesian Cloud</title>
	<atom:link href="https://indonesiancloud.com/tag/praktik-pada-waf/feed/" rel="self" type="application/rss+xml" />
	<link>https://indonesiancloud.com</link>
	<description>100% Lokal &#124; Multi Cloud Privider Indonesia &#124; Berbasis cloud computing Indonesian Cloud. Kebutuhan teknologi untuk bisnis Anda, mulai dari (IaaS), Cyber Security hingga solusi bisnis (SaaS).</description>
	<lastBuildDate>Thu, 02 Apr 2026 07:27:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://indonesiancloud.com/wp-content/uploads/2019/11/cropped-IDCloud-Favicon-150x150.png</url>
	<title>Praktik pada WAF - Indonesian Cloud</title>
	<link>https://indonesiancloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WAF Security: Best Practices to Protect Your Web Applications</title>
		<link>https://indonesiancloud.com/waf-security-best-practices-to-protect-your-web-applications/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=waf-security-best-practices-to-protect-your-web-applications</link>
		
		<dc:creator><![CDATA[idcloud]]></dc:creator>
		<pubDate>Fri, 02 Apr 2021 07:33:00 +0000</pubDate>
				<category><![CDATA[Artikel]]></category>
		<category><![CDATA[Praktik pada WAF]]></category>
		<category><![CDATA[WAF]]></category>
		<category><![CDATA[Web Application Firewall]]></category>
		<guid isPermaLink="false">https://indonesiancloud.com/?p=11515</guid>

					<description><![CDATA[<p>A Web Application Firewall (WAF) protects your company from various web attacks such as SQL injection, XSS, remote command execution, and malicious webshell uploads. By default, WAF runs in normal protection mode to keep your applications safe. WAF provides two operation modes: Protection Mode and Warning Mode. Protection Mode automatically blocks malicious requests and records [&#8230;]</p>
<p>The post <a href="https://indonesiancloud.com/waf-security-best-practices-to-protect-your-web-applications/">WAF Security: Best Practices to Protect Your Web Applications</a> first appeared on <a href="https://indonesiancloud.com">Indonesian Cloud</a>.</p>]]></description>
										<content:encoded><![CDATA[<p data-start="499" data-end="743">A Web Application Firewall (WAF) protects your company from various web attacks such as SQL injection, XSS, remote command execution, and malicious webshell uploads. By default, WAF runs in normal protection mode to keep your applications safe.</p>
<p data-start="745" data-end="820">WAF provides two operation modes: <strong data-start="779" data-end="798">Protection Mode</strong> and <strong data-start="803" data-end="819">Warning Mode</strong>.</p>
<ul data-start="822" data-end="999">
<li data-section-id="1vxe1qt" data-start="822" data-end="909"><strong data-start="824" data-end="843">Protection Mode</strong> automatically blocks malicious requests and records the attack.</li>
<li data-section-id="1fvvyja" data-start="910" data-end="999"><strong data-start="912" data-end="928">Warning Mode</strong> does not block the request, but it still logs the suspicious activity.</li>
</ul>
<p data-start="1001" data-end="1075">When using Protection Mode, you can select from three protection policies:</p>
<ul data-start="1077" data-end="1300">
<li data-section-id="19q2165" data-start="1077" data-end="1141"><strong data-start="1079" data-end="1088">Loose</strong>: Blocks requests that match broad attack patterns.</li>
<li data-section-id="1x69fht" data-start="1142" data-end="1209"><strong data-start="1144" data-end="1154">Normal</strong>: Blocks requests that follow common attack patterns.</li>
<li data-section-id="1nz47i1" data-start="1210" data-end="1300"><strong data-start="1212" data-end="1222">Strict</strong>: Blocks requests designed with highly specific or advanced attack signatures.</li>
</ul>
<hr data-start="1302" data-end="1305" />
<h2 data-section-id="1ghq106" data-start="1307" data-end="1348"><span role="text"><strong data-start="1310" data-end="1348">Tips for Using WAF Protection Mode</strong></span></h2>
<p><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-37660" src="https://indonesiancloud.com/wp-content/uploads/2021/04/Template-Blog-15-1024x724.webp" alt="WAF" width="800" height="566" srcset="https://indonesiancloud.com/wp-content/uploads/2021/04/Template-Blog-15-1024x724.webp 1024w, https://indonesiancloud.com/wp-content/uploads/2021/04/Template-Blog-15-300x212.webp 300w, https://indonesiancloud.com/wp-content/uploads/2021/04/Template-Blog-15-768x543.webp 768w, https://indonesiancloud.com/wp-content/uploads/2021/04/Template-Blog-15.webp 1500w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p data-start="1350" data-end="1529">If you are unsure about your website’s traffic patterns, it is better to start with Warning Mode. This allows you to observe traffic for a week or two and analyze the attack logs.</p>
<p data-start="1531" data-end="1740">Once you confirm that no normal requests are blocked, you can safely switch to Protection Mode.<br data-start="1626" data-end="1629" />However, if normal requests appear in the attack log, you should contact customer support to resolve the issue.</p>
<p data-start="1742" data-end="1799">To maintain smooth operations, keep these points in mind:</p>
<ul data-start="1801" data-end="2176">
<li data-section-id="1knqjuo" data-start="1801" data-end="1867">Avoid sending raw SQL or JavaScript code inside HTTP requests.</li>
<li data-section-id="1ng2c6z" data-start="1868" data-end="1947">Do not use keywords such as <strong data-start="1898" data-end="1908">UPDATE</strong> or <strong data-start="1912" data-end="1919">SET</strong> as part of your URL path.</li>
<li data-section-id="kg1n6u" data-start="1948" data-end="2072">If file upload is required, limit the file size to 50 MB. For larger files, consider using OSS or another upload method.</li>
<li data-section-id="iefbwf" data-start="2073" data-end="2176">After WAF is enabled, do not disable the <strong data-start="2116" data-end="2134">“All Requests”</strong> option under the default HTTP ACL Policy.</li>
</ul>
<p data-start="2178" data-end="2399">Once the WAF is active, you can open <strong data-start="2215" data-end="2226">Reports</strong> to view detailed information about blocked attacks. Whenever new vulnerabilities are discovered, WAF updates its protection rules and publishes security bulletins promptly.</p>
<hr data-start="2401" data-end="2404" />
<h1 data-section-id="t0fsia" data-start="2406" data-end="2458"><span role="text"><strong data-start="2408" data-end="2458">Why Traditional Firewalls Are No Longer Enough</strong></span></h1>
<p data-start="2460" data-end="2679">Most companies still rely on perimeter firewalls to control traffic entering and leaving their network. While these firewalls protect against basic internet threats, they cannot defend against application-level attacks.</p>
<p data-start="2681" data-end="2893">Attackers know how to slip through open ports used by legitimate applications. Because traditional firewalls cannot inspect application-layer data deeply, attackers can hide malware inside the application itself.</p>
<p data-start="2895" data-end="3037">Therefore, an <strong data-start="2909" data-end="2945">application-level firewall (WAF)</strong> is essential. As attackers become more advanced, your defense strategy must evolve as well.</p>
<p data-start="3039" data-end="3210">However, since WAF technology is relatively new, IT teams often need guidance during deployment. Below are <strong data-start="3146" data-end="3170">three best practices</strong> to help you build a more secure system.</p>
<hr data-start="3212" data-end="3215" />
<h2 data-section-id="1fvulz3" data-start="3217" data-end="3267"><span role="text"><strong data-start="3220" data-end="3267">1. Choose a True Application-Level Firewall</strong></span></h2>
<p data-start="3269" data-end="3352">A real application-level firewall provides full protection against threats such as:</p>
<ul data-start="3354" data-end="3533">
<li data-section-id="ana3td" data-start="3354" data-end="3371">SQL injection</li>
<li data-section-id="igum86" data-start="3372" data-end="3402">Cross-site scripting (XSS)</li>
<li data-section-id="mvpxys" data-start="3403" data-end="3424">Session hijacking</li>
<li data-section-id="16yjw9u" data-start="3425" data-end="3458">Scanning and crawling attacks</li>
<li data-section-id="6o97s" data-start="3459" data-end="3479">Cookie poisoning</li>
<li data-section-id="1s4pe5f" data-start="3480" data-end="3507">Path traversal attempts</li>
<li data-section-id="15ec6z2" data-start="3508" data-end="3533">Denial of Service (DoS)</li>
</ul>
<p data-start="3535" data-end="3769">Many people confuse WAF with deep-packet inspection tools, web security gateways, or content-filtering products. Although these tools are helpful, they cannot inspect application-layer code deeply enough to stop sophisticated threats.</p>
<p data-start="3771" data-end="3917">Likewise, web security gateways may block malware from websites or emails, but application-level attacks often bypass them. A WAF closes this gap.</p>
<hr data-start="3919" data-end="3922" />
<h2 data-section-id="4uq7p8" data-start="3924" data-end="3962"><span role="text"><strong data-start="3927" data-end="3962">2. Do Not Ignore Access Control</strong></span></h2>
<p data-start="3964" data-end="4129">Another important step is ensuring your WAF includes access control. Access control determines who can access your systems and data, as well as when, where, and how.</p>
<p data-start="4131" data-end="4307">An ideal application-level firewall integrates with your access management system. It monitors employee access and ensures that only authorized users can manage the WAF itself.</p>
<p data-start="4309" data-end="4410">Because of this, access control becomes a crucial layer that prevents misuse or unauthorized changes.</p>
<hr data-start="4412" data-end="4415" />
<h2 data-section-id="1v3yg3v" data-start="4417" data-end="4472"><span role="text"><strong data-start="4420" data-end="4472">3. Select a WAF That Fits Your IT Infrastructure</strong></span></h2>
<p data-start="4474" data-end="4655">Your WAF must be compatible with your existing web and network infrastructure. If you have to redesign your system just to install a firewall, you waste valuable time and resources.</p>
<p data-start="4657" data-end="4895">If you still rely on centralized hardware or off-site servers, an application-firewall specialist can recommend the most suitable solution. Some application firewalls, for example, can be installed as plug-ins on your current web servers.</p>
<p data-start="4897" data-end="5096">Performance is another key consideration. A poorly configured WAF may slow down your network and affect website traffic. To avoid this, the WAF must match your infrastructure and be set up correctly.</p>
<hr data-start="5098" data-end="5101" />
<h1 data-section-id="12v0y90" data-start="5103" data-end="5123"><span role="text"><strong data-start="5105" data-end="5123">Final Thoughts</strong></span></h1>
<p data-start="5125" data-end="5370">The steps above highlight only three essential best practices for using a WAF effectively. Although an application-level firewall is just one part of a complete security strategy, it plays a critical role in defending against modern web threats.</p>
<p data-start="5372" data-end="5578">At Indonesian Cloud, we proudly partner with <strong data-start="5417" data-end="5448">Imperva, Cloudflare, and F5</strong>. Our team can help you strengthen your website security and protect your business in today’s fast-growing cyber threat landscape.</p>
<p data-start="5580" data-end="5775">If you would like to explore more technology topics or learn about Indonesian Cloud products, visit <a href="http://Indonesiancloud.com"><strong data-start="5680" data-end="5703">Indonesiancloud.com</strong></a> or our VPS site <a href="http://cloudhostingaja.com"><strong data-start="5720" data-end="5743">cloudhostingaja.com</strong></a>.<br data-start="5744" data-end="5747" />See you in the next article!</p><p>The post <a href="https://indonesiancloud.com/waf-security-best-practices-to-protect-your-web-applications/">WAF Security: Best Practices to Protect Your Web Applications</a> first appeared on <a href="https://indonesiancloud.com">Indonesian Cloud</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
