Airlock Microgateway has built-in deny rules that effectively block malicious requests to upstream web applications. This deny rule set is constantly evolving and updated to respond to the latest threats.
Each of these deny rules is identified by a deny rule key that can be referenced for configuration purposes. Each ruleKeys
refers to different attack types such as SQL injection, XSS, TEMPLATE injection, etc.
- The CRD DenyRules allows configuring the following in the CR:
- The global security level.
- The
threadHandlingMode
(e.g.Block
orLogOnly
) can be configured globally and on the rule key level. - Deny rule overrides to change settings (e.g. security level or threat handling mode) of specific deny rules.
- Deny rule exceptions for requests that match one or more deny rules but should not be blocked. Exceptions can be configured and fine-tuned to reduce the number of false positives using
blockedData
and/orrequestConditions
based on various characteristics. - The definition of custom deny rules.
General tips for working with CRs
- CLI:
- Use
kubectl explain <replace with CRD name> --recursive
to list all available options and the YAML structure. - Check the CRD description texts with
kubectl explain <replace with CRD name and path>
of the available options for more details.
- API Reference documentation:
- Click on the link to open the CR-related documentation in a new browser tab or window: CRD Reference documentation. See also the API Reference documentation links at the end article.