Customer Presentation - F5 Distributed Cloud Web App and API Protection (WAAP)
Customer Presentation - F5 Distributed Cloud Web App and API Protection (WAAP)
Position/Title
Date
Speaker Bios
2 © 2022 F5
Speaker Bios
3 © 2022 F5
Speaker Bios
[Insert Name]
[Insert Title]
Brief bio or bullet points with key credential or accomplishment
• Key credential or major accomplishment
• Key credential or major accomplishment
• Key credential or major accomplishment
• Social media link
4 © 2022 F5
Company Profile
5 © 2022 F5
Apps are evolving and becoming increasingly complex
API first architectures for apps are not table stakes
6 © 2022 F5
Increasing complexity and risk
Public Cloud
CDN
Users
Public Cloud
CDN
Users
Public Cloud
8 © 2022 F5
Security enforcement impacts agility
Public Cloud
Public Cloud
9 © 2022 F5
Management & Ops Tier
Simplifying App Services – Generic Architecture System Source of Truth
Integration and Testing
A framework for organizing and optimizing critical app services Automated Delivery
Operational Observability and Insights
Business Workflow Management
Secure Network
Backbone
Site Shared Service Tier
Scalable App Delivery
Region
Region
Region
Site App Health
Site Shared
Site Shared
Services Tier Services
App Service Tier
Scalable App Delivery
Global Anti-Abuse
App Protection
Layer 3-4 DDoS Mitigation, API L7 DDoS Anti-fraud & App Delivery API App/web K8s
Security, Bot Defense etc. Mitigation Bot Gateway Server Management
MULTI-CLOUD
12 © 2022 F5
SaaS-delivered
Application More than just WAF, protect apps
and APIs against bots,
Easily scale and deploy in
any cloud
A differentiated approach to
application and API security
14 © 2022 F5
It's much more than just WAAP...
CDN
Public Cloud
F5 Global Network
Private Cloud / Data Center Branch/Customer Edge
20 © 2022 F5
Multi-App Dashboards
Rich observability with a 360-degree view of performance and security posture for all apps together
I L L U S T R AT I V E Security Performance
21 © 2022 F5
Flexible Deployment Models
• Provides L3/L4 DDoS via network • Site includes WAAP security services except • Provides for private address/FQDN access
L3/L4 DDoS of origins
• Advertises via Anycast
• WAF and additional security services at
• Origins accessed via Public NAT/FQDN • Self-managed advertisement based on both the customer site and global network
• Global network can be access controlled deployed locations
• L3/L4 DDoS is provided via network
(ACL) at origin sites
• SaaS managed Load balancing/WAF endpoints
Public/Private Cloud
22 © 2022 F5
Flexible Service Options
Increasingly, F5 Distributed Cloud Services are being offered as a SaaS Managed Service. Offering critical app
security as a Managed Service enables F5 to deliver unique customer value in terms of service onboarding
and configuration, technical engineering support, 24x7 monitoring and phone support, uptime and specific
service SLAs etc.
WAF X X X
DDoS Mitigation X X
Bot Defense X X X
23 © 2022 F5
“
Awards and Recognition
What I most liked about the
product [is] the ease of
deployment. Second is protecting
against the OWASP top 10 which
WAF does protect against.
Overall impressed with the ease
“
of use and level of security [of]
the product.
“
When Log4j was announced, F5
immediately updated their
signatures, and we could apply
them to a web application firewall.
F5 Distributed Cloud WAF (Web Application Firewall) Reviews & Ratings 2023 ([Link])
That gave us immediate
protection...And then we could
“
see requests instantly getting
blocked for that Log4j piece.
24 © 2022 F5
Awards and Recognition (cont.)
“
10 vendors that are a “must see”.
These “visionaries” provide
products and solutions that are
“
some of the best in the industry.
[Link]
25 © 2022 F5
API Security
Continuous API discovery, enforcement and observability
28 © 2023 F5
Behavioral
Analysis of API
Endpoints
29 © 2023 F5
Discovery and
Validation of API
Authentication
30 © 2023 F5
Discovery and
Monitoring for
PII Data in APIs
31 © 2023 F5
API Endpoint
Risk Scoring
32 © 2023 F5
OpenAPI Spec Import
and Enforcement
Automatically enforce API schema
and a Positive Security Model
33 © 2022 F5
Rich Inline Enforcement Capabilities
Comprehensive app and API security controls to block/allow, limit or control connections and activity
• API Protection Rules – allow/deny list, rate limit, Geo IP filter and custom rule creation
to act on incoming requests including match and request constraint criteria for specific
API endpoints or groups
• Layer 7 DoS – anomaly detection and alerting on abnormal traffic patterns and trends in
API endpoints with the ability to deny with auto mitigation
• WAF Signatures and Enforcement – F5's core WAF technology, supports the
inspection of various API protocols against nearly 8,000 signatures identified by F5 labs
34 © 2023 F5
F5 Distributed Cloud Bot Defense
Enhanced AI/ML driven bot detection and mitigation
Bots and
Unwanted
Automation
Standard Bot Defense
• Necessary to mitigate advanced, persistent bots Best
36 | ©2021
36 © 2022F5
F5
Standard Bot Defense
Highly effective real-time detection informs mitigation actions
XC Cloud
Bot Defense
Less Complex
…
IP/ASN
More Complex
37 © 2022 F5
Standard Bot Defense
Globalized network of signals & ML used to catch retooling
2/3
Top Hospitality Expert
Review of FPs
[ HUMANS IN
2/10 THE LOOP ]
Expert Review
of Pattern
Top Retail [ HUMANS IN
THE LOOP ]
Machine Learning
5/10 model usage and training
Top Credit Cards
5/10 Monitoring
Supervised
Top Airlines
ML
2/5
Top Insurance
Expert Review of Model
[ HUMANS IN THE LOOP ]
38 © 2022 F5
Bot Reporting and Insights
Streamline Security for Apps Eliminate Bots, Fraud, and Manage and Secure APIs Simplify Security for Agile
Across Multi-Cloud/Hybrid Abuse App Development
Environments
• Managing web app vulnerabilities • Malicious automated traffic • Identity and access management • Lack of programmability/automation
• Limited visibility across • Increasing bandwidth costs • API abuse • Limited or difficult Integrations with
environments • • Identifying shadow APIs development tools
Denial of service (DoS)
• Scaling security globally • Information leakage • Slowing development cycles and
• Inefficient app performance
• Information leakage releases
• Payment fraud • Maintaining compliance
• Maintaining compliance • Inefficient app performance
• Account takeover
• Inefficient app performance • Limits to scalability
• Scraping
• False positive suppression • Token cracking
• Inventory hoarding
• Ad fraud
40 © 2022 F5
F5 Distributed Cloud WAF - Identifying new threat actors
Moving beyond signature-based detection
42 © 2022 F5
A Next Gen WAF
Streamlined set up and management with
self-service or managed service options
• IP Reputation Service
• Request rates
• Error rates
44 © 2022 F5
L7 Policy Enforcement – Service Policy Engine
Enabling micro segmentation and support for advanced security at the application layer
*Shows configuration workflow for policy rule, policy/policies and policy set. Services Policy set consist of many
Service Policies and each Service Policy is comprised of many Policy Rules.
45 © 2022 F5
Layer 7 DoS
• Detection and alerting on
abnormal traffic patterns &
trends
I L L U S T R AT I V E
46 © 2022 F5
IP Reputation
F5 database of known
malicious IP addresses
categorized into easily
applied threat categories
• Span sources
• Mobile threats
• Windows exploits
• Web attacks
• Botnets
• Scanners
• Phishing
47 © 2022 F5
Threat Campaigns
Correlates singular attack incidents as extensive and sophisticated attack campaigns
48 © 2022 F5
Security Events Dashboard
Visualize all app security events in one place
Security Forensics
Event Logs
Event
Log Details
49 © 2022 F5
Managed WAF Onboarding
F5 experts help you with the creation, provisioning, deployment and tuning of best-in-class WAF policies
Getting Connected Setting Expectations Configure WAF Configure L7 DDoS ü Move policy from transparent
to the F5 Global Network to blocking mode
ü WAF Questionnaire ü Configure WAF policies in ü Configure Rate Limiting
ü SRE Provisions customer transparent mode Policies
portal for administrator ü Letter of Authorization
ü Review false positives and ü Configure Signature Based
ü ASN Entry and Submit ü SSL Cert and Key Upload false negatives with customer Bot Detection
Prefixes ü LB setup and configuration ü Configure exceptions and
ü Authoritative IRR ü Update DNS to direct tune policy
Live Traffic to LB
ü LB Testing
50 © 2022 F5
F5 Distributed Cloud DDoS Mitigation
• Block the malicious traffic while allowing the good, ensuring good user
experience for applications and services
• Identify and mitigate sophisticated Layer 7 DoS attacks that exploit
application & infrastructure weaknesses
• Block attacks closer to where they originate with a global backbone and
distributed DoS mitigation technology
• Protect customer networks and services with Always On or Always
Available routed and proxy DDoS Mitigation service
51 © 2022 F5
F5 Distributed Cloud DDoS Mitigation - Layers of Protection
Advanced Mitigation
Full packet analysis, custom filtering and
advanced counter measures (scrubbing) for
the most advanced attacks
CoreProtect
Pre-set rules that mitigate known-bad/known-
useless traffic types that are always filtered
immediately for all customer
Layer 7 and Proxy DDoS Protection
Protects apps and services from protocol
attacks, L7 DoS and encrypted threats
Custom Mitigations
SOC analysis of traffic and implementation of any
additional rules necessary to improve efficacy or
Auto-Mitigation
reduce false positives of attack mitigation
Machine learning profiles traffic and
automatically creates and deploys counter-
measures for volumetric DDoS attacks
52 © 2022 F5
Mitigate Large, Sophisticated DDoS Attacks
Mitigate closer to the origin away from critical apps and infrastructure
53 © 2022 F5
Routed DDoS Mitigation Service Options
Choose from two DDoS Mitigation configurations
54 © 2022 F5
DDoS Mitigation Architecture
Edge Mitigation
CoreProtect – Global Rules
Auto Mitigation
Advanced Mitigation
Custom Filters/Countermeasures
Deep Packet Inspection
Inbound Traffic
Always-on or Always Available
Traffic Management
Deny Lists
Circuit Visibility
Connectivity Options
Layer 2 / Direct / 3rd Party
57 © 2022 F5
Integrated View
with DDoS Attacks
59 © 2022 F5
Robust DDoS Attack Mitigation Reporting
Gain attack insights and threat intelligence
• Mitigation techniques
• Attack protocols
60 © 2022 F5
DDoS Mitigation Onboarding
F5 experts help you provision critical network components, configuring protections and establish incident procedures
Technical PREFIX
Platform Set Onboarding Traffic Routing BGP Activation Route Change
Getting Connected Setting Expectations Setup of Traffic Flows ü Router Configuration ü SOC Confirms Route Controls
to the F5 Global Network
ü DDoS Questionnaire ü Selection of RE for Tunnel ü SOC: Enabling BGP ü SOC Enables Route
ü Portal Tenant Account Termination Adjacency Announcement
ü Letter of Authorization
ü ASN Entry and Submit ü SOC previsions /31 to ü SOC: Controlling Route ü Analyze and Resolve Route Leaks
Prefixes ü Review AS-PATH Prepends customer Origination
ü SOC shows DDoS Alerts, events,
ü Authoritative IRR ü Upstream Carrier ü Peer Secret to SOC ü Router Change Scheduling dashboard, log exporting
Announcements Review
ü SOC activates tunnel ü Commit to Router ü Transition to CSM
ü Router Preference Values endpoints Changes/Test
ü Project Timeline ü Testing/Integrity of tunnels ü Tuning and Resolutions
ü Q&A with F5 SOC ü Private Links
DDoS Team
61 © 2022 F5
Distributed Denial of Service (DDoS) Attacks Hit an all-time High in 2022
DDOS ATTACKS CONTINUE TO GROW IN SIZE AND COMPLEXITY YoY
1 Attack,
multiple vectors
1,
F5 Labs: 2022 Application Protection Report: DDoS Attack Trends, March 16, 2022
62 © 2022 F5 CONFIDENTIAL - ISMC FY23
Distributed Denial of Service (DDoS) Summary
DDoS
Attackers
Network Application
SSL attacks
SSL renegotiation
ISP A
Routers
Firewalls Applications
Network attacks DNS attacks Firewall HTTP attacks
ICMP flood DNS amplification Load Balancers Vulnerabilities
UDP flood query flood Slowloris
SYN flood dictionary attack Slow POST
DNS poisoning DNS recursive
POST/GET
Simple UI Configuration
• Includes request and security event logs (e.g. WAF, Bot Defense,
API security, L7 DDoS , service policy and malicious user events) DDoS Web App Bot API
Mitigation Firewall Defense Security
• Support for multiple delivery streams e.g. vendor specific, public
cloud storage and generic HTTP(s) delivery options
• Export from regional edges (REs) and customer edge (CE) locations
64 © 2022 F5
F5 Global Network
Secure Application Delivery
F5 Distributed Cloud CDN integrated with app and API security
65 © 2022 F5
Simplified Cloud Migration with USE CASE
Improved Resiliency and Robust Application Security and Performance
Security
Industry: Online Gaming
B2C GAMING CUSTOMER OUTCOMES
Online gaming and poker technology company F5 Distributed Cloud WAAP allowed this customer
experienced a large DDoS attack of their private to reduce their reliance on a private data center
data center which had a major impact on and seamlessly move to the cloud. Giving them
Reduced number of vendors
their business. Needing a quick solution to resolve virtually unlimited capacity to scale and
from 6+ to 2
the attack they turned to F5. more resiliency while simplifying their operations.
With a centralized view and common services
MULTI-CLOUD ADOPTION platform across their data center, clouds and edge
After the DDoS attack had been mitigated, they locations; collaboration across teams improved
realized they needed to think more critically about while a robust security stack enhanced their overall
security and redundancy – how they would prevent app security posture with WAF, DDoS Mitigation,
such events in the future with back-up/duplication API security:
of key business functions to reduce risk.
• Increased collaboration across siloed
F5 SOLUTION: DISTRIBUTED CLOUD technical functions
Following the initial engagement, they expanded • End-to-end security – reduced risk across their
use of Distributed Cloud Mesh to connect, load ever-expanding application ecosystem
balance and secure newly migrated workloads • Vendor consolidation – replaced multiple app Reduced time to service from
across multiple cloud environments. services, standardizing across multiple clouds 8+ weeks to 1
66 © 2022 F5
Key Differentiators
67 © 2022 F5
Appendix – Bot and Fraud Solutions
within F5 Distributed Cloud
70 © 2022 F5
F5 Distributed Cloud Security and Fraud Solutions
71 © 2022 F5
Bot Defense - Stop bots with unmatched accuracy and ongoing
efficacy
72 © 2022 F5
Distributed Cloud Client-Side Defense fills the gap with real-
time monitoring in the browser