Policies define the security rules you can leverage to protect your application ecosystem from threats like unauthorized access, SQL injection, and malicious traffic. These policies enable you to control the security of your application based on your configuration of the predefined and custom rules.
Policy Types
Traceable divides policies into three categories:
Category | Description |
---|---|
WAF (Web Application Firewall) Policies | Pre-defined rules that protect your application from web-based security threats, offering protection against OWASP Top 10 security breaches, SQL injection, Cross-site scripting (XSS), malicious traffic, etc. For more information, see WAF. |
API Protection Policies | Pre-defined rules that protect your APIs from threats such as broken authorization, JWT anomaly, etc. These policies help identify API-specific vulnerabilities, attack patterns, and enforce security controls accordingly. For more information, see API Protection. |
Custom Policies | Allows you to define tailored security rules for protecting your application against malicious sources, API abuse or overuse, data loss, etc. The custom policies are divided into the following categories:
For more information, see Custom Policy. |
How are the Policies Helpful?
The policies are helpful as they help you detect and block malicious actions and regulate API requests while ensuring proper authorization and validation. When you use automatic monitoring and blocking using the pre-defined policies, the threat actor is immediately recognized and is either monitored or blocked. If blocked, it does not have a window of opportunity to damage your system.
Using customizable policies, you can enhance your application's API and WAF protection and mitigate threats while maintaining application performance and reducing manual intervention.